-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
Abadi M. Secrecy by typing in security protocols. J. ACM 46 5 (1999) 749-786
-
(1999)
J. ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
33749846305
-
Cryptographically-masked flows
-
Proc. Symp. on Static Analysis, Springer Verlag
-
Askarov A., Hedin D., and Sabelfeld A. Cryptographically-masked flows. Proc. Symp. on Static Analysis. LNCS (August 2006), Springer Verlag 353-369
-
(2006)
LNCS
, pp. 353-369
-
-
Askarov, A.1
Hedin, D.2
Sabelfeld, A.3
-
3
-
-
33646080360
-
Security-typed languages for implementation of cryptographic protocols: A case study
-
Proc. European Symp. on Research in Computer Security, Springer Verlag
-
Askarov A., and Sabelfeld A. Security-typed languages for implementation of cryptographic protocols: A case study. Proc. European Symp. on Research in Computer Security. LNCS vol. 3679 (September 2005), Springer Verlag 197-221
-
(2005)
LNCS
, vol.3679
, pp. 197-221
-
-
Askarov, A.1
Sabelfeld, A.2
-
4
-
-
34548715313
-
-
A. Askarov, A. Sabelfeld, Gradual release: Unifying declassification, encryption and key release policies, in: Proc. IEEE Symp. on Security and Privacy, May 2007, pp. 207-221
-
A. Askarov, A. Sabelfeld, Gradual release: Unifying declassification, encryption and key release policies, in: Proc. IEEE Symp. on Security and Privacy, May 2007, pp. 207-221
-
-
-
-
5
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
Advances in Cryptology- Crypto 98
-
Bellare M., Desa A., Pointcheval D., and Rogaway P. Relations among notions of security for public-key encryption schemes. Advances in Cryptology- Crypto 98. LNCS vol. 1462 (January 1998) 26-46
-
(1998)
LNCS
, vol.1462
, pp. 26-46
-
-
Bellare, M.1
Desa, A.2
Pointcheval, D.3
Rogaway, P.4
-
7
-
-
35248822352
-
Encryption-scheme security in the presence of key-dependent messages
-
Selected Areas in Cryptography, Springer Verlag
-
Black J., Rogaway P., and Shrimpton T. Encryption-scheme security in the presence of key-dependent messages. Selected Areas in Cryptography. LNCS vol. 2595 (August 2002), Springer Verlag 62-75
-
(2002)
LNCS
, vol.2595
, pp. 62-75
-
-
Black, J.1
Rogaway, P.2
Shrimpton, T.3
-
10
-
-
84942244044
-
-
T. Chothia, D. Duggan, J. Vitek, Type-based distributed access control, in: Proc. IEEE Computer Security Foundations Workshop, 2003, pp. 170-186
-
T. Chothia, D. Duggan, J. Vitek, Type-based distributed access control, in: Proc. IEEE Computer Security Foundations Workshop, 2003, pp. 170-186
-
-
-
-
11
-
-
46449098710
-
-
D. Clark, S. Hunt, Observation, nondeterminism and nondeducability on strategies. Workshop presentation at PLID'07, 3rd International Workshop on Programming Language Dependence and Independence, August 2007
-
D. Clark, S. Hunt, Observation, nondeterminism and nondeducability on strategies. Workshop presentation at PLID'07, 3rd International Workshop on Programming Language Dependence and Independence, August 2007
-
-
-
-
12
-
-
0001760770
-
Information transmission in sequential programs
-
DeMillo R.A., Dobkin D.P., Jones A.K., and Lipton R.J. (Eds), Academic Press
-
Cohen E.S. Information transmission in sequential programs. In: DeMillo R.A., Dobkin D.P., Jones A.K., and Lipton R.J. (Eds). Foundations of Secure Computation (1978), Academic Press 297-335
-
(1978)
Foundations of Secure Computation
, pp. 297-335
-
-
Cohen, E.S.1
-
13
-
-
0033718531
-
-
M. Dam, P. Giambiagi, Confidentiality for mobile code: The case of a simple payment protocol, in: Proc. IEEE Computer Security Foundations Workshop, July 2000, pp. 233-244
-
M. Dam, P. Giambiagi, Confidentiality for mobile code: The case of a simple payment protocol, in: Proc. IEEE Computer Security Foundations Workshop, July 2000, pp. 233-244
-
-
-
-
14
-
-
0017517624
-
Certification of programs for secure information flow
-
Denning D.E., and Denning P.J. Certification of programs for secure information flow. Comm. ACM 20 7 (July 1977) 504-513
-
(1977)
Comm. ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
16
-
-
35248815514
-
On the secure implementation of security protocols
-
Proc. European Symp. on Programming, Springer Verlag
-
Giambiagi P., and Dam M. On the secure implementation of security protocols. Proc. European Symp. on Programming. LNCS vol. 2618 (April 2003), Springer Verlag 144-158
-
(2003)
LNCS
, vol.2618
, pp. 144-158
-
-
Giambiagi, P.1
Dam, M.2
-
18
-
-
27244444891
-
-
A. Gordon, A. Jeffrey, Secrecy despite compromise: Types, cryptography, and the pi-calculus, Proc. CONCUR'05 Number 3653, LNCS, pp 186-201 Springer Verlag, August 2005
-
A. Gordon, A. Jeffrey, Secrecy despite compromise: Types, cryptography, and the pi-calculus, Proc. CONCUR'05 Number 3653, LNCS, pp 186-201 Springer Verlag, August 2005
-
-
-
-
19
-
-
46449122040
-
-
B. Hicks, D. King, P. McDaniel, Declassification with cryptographic functions in a security-typed language, Technical Report NAS-TR-0004-2005, Network and Security Center, Department of Computer Science, Pennsylvania State University, May 2005
-
B. Hicks, D. King, P. McDaniel, Declassification with cryptographic functions in a security-typed language, Technical Report NAS-TR-0004-2005, Network and Security Center, Department of Computer Science, Pennsylvania State University, May 2005
-
-
-
-
20
-
-
84945249768
-
Semantics and program analysis of computationally secure information flow
-
Proc. European Symp. on Programming, Springer Verlag
-
Laud P. Semantics and program analysis of computationally secure information flow. Proc. European Symp. on Programming. LNCS vol. 2028 (April 2001), Springer Verlag 77-91
-
(2001)
LNCS
, vol.2028
, pp. 77-91
-
-
Laud, P.1
-
21
-
-
35248840989
-
Handling encryption in an analysis for secure information flow
-
Proc. European Symp. on Programming, Springer Verlag
-
Laud P. Handling encryption in an analysis for secure information flow. Proc. European Symp. on Programming. LNCS vol. 2618 (April 2003), Springer Verlag 159-173
-
(2003)
LNCS
, vol.2618
, pp. 159-173
-
-
Laud, P.1
-
23
-
-
26844509701
-
-
P. Laud, V. Vene, A type system for computationally secure information flow, in: Proc. Fundamentals of Computation Theory, in: LNCS, vol. 3623, August 2005, pp. 365-377
-
P. Laud, V. Vene, A type system for computationally secure information flow, in: Proc. Fundamentals of Computation Theory, in: LNCS, vol. 3623, August 2005, pp. 365-377
-
-
-
-
25
-
-
0023829319
-
Noninterference and the composability of security properties
-
McCullough D. Noninterference and the composability of security properties. Proc. IEEE Symp. on Security and Privacy (May 1988) 177-186
-
(1988)
Proc. IEEE Symp. on Security and Privacy
, pp. 177-186
-
-
McCullough, D.1
-
26
-
-
84945290421
-
Probabilistic polynomial-time process calculus and security protocol analysis
-
Proc. European Symp. on Programming, Springer Verlag
-
Mitchell J.C. Probabilistic polynomial-time process calculus and security protocol analysis. Proc. European Symp. on Programming. LNCS vol. 2028 (April 2001), Springer Verlag 23-29
-
(2001)
LNCS
, vol.2028
, pp. 23-29
-
-
Mitchell, J.C.1
-
28
-
-
33646177208
-
Enforcing robust declassification and qualified robustness
-
Myers A.C., Sabelfeld A., and Zdancewic S. Enforcing robust declassification and qualified robustness. J. Computer Security 14 2 (May 2006) 157-196
-
(2006)
J. Computer Security
, vol.14
, Issue.2
, pp. 157-196
-
-
Myers, A.C.1
Sabelfeld, A.2
Zdancewic, S.3
-
29
-
-
46449111289
-
-
National Institute of Standards and Technology. Special publication 800-38a. Recommendation for block cipher modes of operation, December 2001
-
National Institute of Standards and Technology. Special publication 800-38a. Recommendation for block cipher modes of operation, December 2001
-
-
-
-
31
-
-
35048828759
-
A model for delimited information release
-
Proc. International Symp. on Software Security (ISSS'03), Springer Verlag
-
Sabelfeld A., and Myers A.C. A model for delimited information release. Proc. International Symp. on Software Security (ISSS'03). LNCS vol. 3233 (October 2004), Springer Verlag 174-191
-
(2004)
LNCS
, vol.3233
, pp. 174-191
-
-
Sabelfeld, A.1
Myers, A.C.2
-
32
-
-
28144453799
-
-
A. Sabelfeld, D. Sands, Dimensions and principles of declassification, in: Proc. IEEE Computer Security Foundations Workshop, June 2005, pp. 255-269
-
A. Sabelfeld, D. Sands, Dimensions and principles of declassification, in: Proc. IEEE Computer Security Foundations Workshop, June 2005, pp. 255-269
-
-
-
-
38
-
-
0030370740
-
A sound type system for secure flow analysis
-
Volpano D., Smith G., and Irvine C. A sound type system for secure flow analysis. J. Comput. Secur. 4 3 (1996) 167-187
-
(1996)
J. Comput. Secur.
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|