-
2
-
-
0030646696
-
Optimistic protocols for fair exchange
-
Zurich, Switzerland, Apr. ACM Press
-
N. Asokan, M. Schunter, and M. Waidner. Optimistic protocols for fair exchange. In 4th ACM Conference on Computer and Communications Security, Zurich, Switzerland, Apr. 1997. ACM Press.
-
(1997)
4th ACM Conference on Computer and Communications Security
-
-
Asokan, N.1
Schunter, M.2
Waidner, M.3
-
3
-
-
35248841072
-
Reactively secure signature schemes
-
M. Backes, B. Pfitzmann, and M. Waidner. Reactively secure signature schemes. In 6th Information Security Conference (ISC), volume 2851 of Lecture Notes in Computer Science, pages 84-95, 2003.
-
(2003)
6th Information Security Conference (ISC), Volume 2851 of Lecture Notes in Computer Science
, vol.2851
, pp. 84-95
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
4
-
-
84974574202
-
Round-optimal and abuse free optimistic multi-party contract signing
-
Geneva, Switzerland, July. Springer-Verlag
-
B. Baum-Waidner and M. Waidner. Round-optimal and abuse free optimistic multi-party contract signing. In Automata, Languages and Programming - ICALP 2000, volume 1853 of Lecture Notes in Computer Science, pages 524-535, Geneva, Switzerland, July 2000. Springer-Verlag.
-
(2000)
Automata, Languages and Programming - ICALP 2000, Volume 1853 of Lecture Notes in Computer Science
, vol.1853
, pp. 524-535
-
-
Baum-Waidner, B.1
Waidner, M.2
-
5
-
-
0025568003
-
Value exchange systems enabling security and unobservability
-
H. Burk and A. Pfitzmann. Value exchange systems enabling security and unobservability. In Computers and Security, 9(8):715-721, 1990.
-
(1990)
Computers and Security
, vol.9
, Issue.8
, pp. 715-721
-
-
Burk, H.1
Pfitzmann, A.2
-
6
-
-
0035751922
-
Inductive methods and contract-signing protocols
-
Philadelphia, PA, USA, Nov. ACM Press
-
R. Chadha, M. Kanovich, and A. Scedrov. Inductive methods and contract-signing protocols. In 8th ACM Conference on Computer and Communications Security, Philadelphia, PA, USA, Nov. 2001. ACM Press.
-
(2001)
8th ACM Conference on Computer and Communications Security
-
-
Chadha, R.1
Kanovich, M.2
Scedrov, A.3
-
7
-
-
4944247375
-
Formal analysis of multi-party contract signing
-
Barcelona, Spain, Apr. Accepted for publication
-
R. Chadha, S. Kremer, and A. Scedrov. Formal analysis of multi-party contract signing. In Workshop on Issues in the Theory of Security - WITS'04, Barcelona, Spain, Apr. 2004. Accepted for publication.
-
(2004)
Workshop on Issues in the Theory of Security - WITS'04
-
-
Chadha, R.1
Kremer, S.2
Scedrov, A.3
-
8
-
-
35248877959
-
Contract signing, optimism, and advantage
-
Springer-Verlag
-
R. Chadha, J. C. Mitchell, A. Scedrov, and V. Shmatikov. Contract signing, optimism, and advantage. In CONCUR 2003 - Concurrency Theory, volume 2761 of Lecture Notes in Computer Science. Springer-Verlag, 2003.
-
(2003)
CONCUR 2003 - Concurrency Theory, Volume 2761 of Lecture Notes in Computer Science
, vol.2761
-
-
Chadha, R.1
Mitchell, J.C.2
Scedrov, A.3
Shmatikov, V.4
-
10
-
-
4243796648
-
Relations among public key signature systems
-
Technion, Haifa, Israel, Mar.
-
S. Even and Y. Yacobi. Relations among public key signature systems. Technical Report 175, Technion, Haifa, Israel, Mar. 1980.
-
(1980)
Technical Report
, vol.175
-
-
Even, S.1
Yacobi, Y.2
-
12
-
-
84947938280
-
Abuse-free multi-party contract signing
-
Bratislava, Slavak Republic, Sept. Springer-Verlag
-
J. A. Garay and P. D. MacKenzie. Abuse-free multi-party contract signing. In International Symposium on Distributed Computing, volume 1693 of Lecture Notes in Computer Science, Bratislava, Slavak Republic, Sept. 1999. Springer-Verlag.
-
(1999)
International Symposium on Distributed Computing, Volume 1693 of Lecture Notes in Computer Science
, vol.1693
-
-
Garay, J.A.1
MacKenzie, P.D.2
-
13
-
-
35248888130
-
Security analysis of (un-) fair non-repudiation protocols
-
A. E. Abdallah, P. Ryan, and S. A. Schneider, editors, London, UK. Springer-Verlag
-
S. Gürgens and C. Rudolph. Security analysis of (un-) fair non-repudiation protocols. In A. E. Abdallah, P. Ryan, and S. A. Schneider, editors, Formal Aspects of Security, volume 2629 of Lecture Notes in Computer Science, pages 97-114, London, UK, 2003. Springer-Verlag.
-
(2003)
Formal Aspects of Security, Volume 2629 of Lecture Notes in Computer Science
, vol.2629
, pp. 97-114
-
-
Gürgens, S.1
Rudolph, C.2
-
14
-
-
84906087402
-
Abstract interpretation of game properties
-
Santa Barbara, USA, June. Springer-Verlag
-
T. A. Henzinger, R. Manjumdar, F. Y. Mang, and J.-F. Raskin. Abstract interpretation of game properties. In SAS 2000: Intertional Symposium on Static Analysis, volume 1824 of Lecture Notes in Computer Science, pages 220-239, Santa Barbara, USA, June 2000. Springer-Verlag.
-
(2000)
SAS 2000: Intertional Symposium on Static Analysis, Volume 1824 of Lecture Notes in Computer Science
, vol.1824
, pp. 220-239
-
-
Henzinger, T.A.1
Manjumdar, R.2
Mang, F.Y.3
Raskin, J.-F.4
-
15
-
-
84948779843
-
Game analysis of abuse-free contract signing
-
Cape Breton, Canada, June. IEEE Computer Society Press
-
S. Kremer and J.-F. Raskin. Game analysis of abuse-free contract signing. In 15th IEEE Computer Security Foundations Workshop, Cape Breton, Canada, June 2002. IEEE Computer Society Press.
-
(2002)
15th IEEE Computer Security Foundations Workshop
-
-
Kremer, S.1
Raskin, J.-F.2
|