-
1
-
-
0035035153
-
Mobile values, new names, and secure communication
-
ACM Press, New York, USA
-
Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: POPL'01: Proc. 28th ACM Symposium on Principles of Programming Languages, pp. 104-115. ACM Press, New York, USA (2001)
-
(2001)
POPL'01: Proc. 28th ACM Symposium on Principles of Programming Languages
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
2
-
-
50249164303
-
Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol
-
To appear
-
Backes, M., Maffei, M., Unruh, D.: Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol. In: IEEE Symposium on Security and Privacy, Proceedings of SSP'08 (2008). To appear
-
(2008)
IEEE Symposium on Security and Privacy, Proceedings of SSP'08
-
-
Backes, M.1
Maffei, M.2
Unruh, D.3
-
3
-
-
38649141810
-
Automated verification of selected equivalences for security protocols
-
Blanchet, B., Abadi, M., Fournet, C.: Automated verification of selected equivalences for security protocols. Journal of Logic and Algebraic Programming 75(1), 3-51 (2008)
-
(2008)
Journal of Logic and Algebraic Programming
, vol.75
, Issue.1
, pp. 3-51
-
-
Blanchet, B.1
Abadi, M.2
Fournet, C.3
-
4
-
-
14844295011
-
Direct Anonymous Attestation
-
ACM Press, New York, USA
-
Brickell, E., Camenisch, J., Chen, L.: Direct Anonymous Attestation. In: CCS '04: 11th ACM conference on Computer and communications security, pp. 132-145. ACM Press, New York, USA (2004)
-
(2004)
CCS '04: 11th ACM conference on Computer and communications security
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
5
-
-
4944247375
-
Formal Analysis of Multi-Party Fair Exchange Protocols
-
R. Focardi ed, IEEE, Asilomar, USA
-
Chadha, R., Kremer, S., Scedrov, A.: Formal Analysis of Multi-Party Fair Exchange Protocols. In: R. Focardi (ed.) 17th IEEE Computer Security Foundations Workshop, pp. 266-279. IEEE, Asilomar, USA (2004)
-
(2004)
17th IEEE Computer Security Foundations Workshop
, pp. 266-279
-
-
Chadha, R.1
Kremer, S.2
Scedrov, A.3
-
7
-
-
33947622187
-
Coercion-Resistance and Receipt-Freeness in Electronic Voting
-
IEEE
-
Delaune, S., Kremer, S., Ryan, M.: Coercion-Resistance and Receipt-Freeness in Electronic Voting. In: CSFW '06: Proc. 19th IEEE workshop on Computer Security Foundations, pp. 28-42. IEEE (2006)
-
(2006)
CSFW '06: Proc. 19th IEEE workshop on Computer Security Foundations
, pp. 28-42
-
-
Delaune, S.1
Kremer, S.2
Ryan, M.3
-
8
-
-
44049106733
-
-
Delaune, S., Kremer, S., Ryan, M.D.: Verifying privacy-type properties of electronic voting protocols. Research report, Laboratoire Spécification et Vérification, ENS Cachan, France (2008)
-
Delaune, S., Kremer, S., Ryan, M.D.: Verifying privacy-type properties of electronic voting protocols. Research report, Laboratoire Spécification et Vérification, ENS Cachan, France (2008)
-
-
-
-
10
-
-
77954124943
-
A Practical Secret Voting Scheme for Large Scale Elections
-
Springer, London
-
Fujioka, A., Okamoto, T., Ohta, K.: A Practical Secret Voting Scheme for Large Scale Elections. In: ASIACRYPT '92: Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, pp. 244-251. Springer, London (1993)
-
(1993)
ASIACRYPT '92: Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques
, pp. 244-251
-
-
Fujioka, A.1
Okamoto, T.2
Ohta, K.3
-
11
-
-
84948969982
-
-
Hirt, M., Sako, K.: Efficient receipt-free voting based on homomorphic encryption. In: Eurocrypt, LNCS, 1807, pp. 539-556 (2000)
-
Hirt, M., Sako, K.: Efficient receipt-free voting based on homomorphic encryption. In: Eurocrypt, LNCS, vol. 1807, pp. 539-556 (2000)
-
-
-
-
12
-
-
23144432349
-
Analysis of an Electronic Voting Protocol in the Applied Pi Calculus
-
ESOP'05: Proc. of the European Symposium on Programming
-
Kremer, S., Ryan, M.D.: Analysis of an Electronic Voting Protocol in the Applied Pi Calculus. In: ESOP'05: Proc. of the European Symposium on Programming, LNCS, vol. 3444, pp. 186-200 (2005)
-
(2005)
LNCS
, vol.3444
, pp. 186-200
-
-
Kremer, S.1
Ryan, M.D.2
-
13
-
-
28144456308
-
An attack on the Needham-Schroeder public-key authentication protocol
-
Lowe, G.: An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters 56(3), 131-133 (1995)
-
(1995)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
14
-
-
44049097713
-
Fair Multi-party Contract Signing using Private Contract Signatures
-
Preprint
-
Mukhamedov, A., Ryan, M.D.: Fair Multi-party Contract Signing using Private Contract Signatures. Information & Computation (2007). Preprint
-
(2007)
Information & Computation
-
-
Mukhamedov, A.1
Ryan, M.D.2
-
15
-
-
38149070279
-
Direct Anonymous Attestation (DAA): Ensuring privacy with corrupt administrators
-
ESAS'07: 4th European Workshop on Security and Privacy in Ad hoc and Sensor Networks
-
Smyth, B., Ryan, M., Chen, L.: Direct Anonymous Attestation (DAA): Ensuring privacy with corrupt administrators. In: ESAS'07: 4th European Workshop on Security and Privacy in Ad hoc and Sensor Networks, LNCS vol. 4572, pp. 218-231 (2007)
-
(2007)
LNCS
, vol.4572
, pp. 218-231
-
-
Smyth, B.1
Ryan, M.2
Chen, L.3
|