-
1
-
-
17644411480
-
Mobile values, new names, and secure communication
-
M. Abadi, C. Fournet, Mobile values, new names, and secure communication, in 28th ACM Symposium on Principles of Programming Languages, 2001, pp. 104-115
-
(2001)
28th ACM Symposium on Principles of Programming Languages
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
2
-
-
84947720399
-
A bisimulation method for cryptographic protocol
-
Proc. ESOP'98. (Springer Berlin)
-
M. Abadi, A.D. Gordon, A bisimulation method for cryptographic protocol, in Proc. ESOP'98. Lecture Notes in Computer Science, vol. 1381 (Springer, Berlin, 1998), pp. 12-26
-
(1998)
Lecture Notes in Computer Science
, vol.1381
, pp. 12-26
-
-
Abadi, M.1
Gordon, A.D.2
-
3
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
Expanded version available as SRC research report 149, January 1998
-
M. Abadi, A.D. Gordon, A calculus for cryptographic protocols: the spi calculus, Inf. Comput. 143, 1-70 (1999). Expanded version available as SRC research report 149, January 1998
-
(1999)
Inf. Comput.
, vol.143
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
4
-
-
35048854169
-
A general composition theorem for secure reactive systems
-
Proceedings of the 1st Theory of Cryptography Conference (TCC 2004). (Springer Berlin)
-
M. Backes, B. Pfitzmann, M. Waidner, A general composition theorem for secure reactive systems, in Proceedings of the 1st Theory of Cryptography Conference (TCC 2004). Lecture Notes in Computer Science, vol. 2951 (Springer, Berlin, 2004), pp. 336-354
-
(2004)
Lecture Notes in Computer Science
, vol.2951
, pp. 336-354
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
6
-
-
84948731889
-
Polynomial fairness and liveness
-
Cape Breton, Nova Scotia, Canada
-
M. Backes, B. Pfitzmann, M. Steiner, M. Waidner, Polynomial fairness and liveness, in Proceedings of 15th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada, 2002, pp. 160-174
-
(2002)
Proceedings of 15th IEEE Computer Security Foundations Workshop
, pp. 160-174
-
-
Backes, M.1
Pfitzmann, B.2
Steiner, M.3
Waidner, M.4
-
7
-
-
35248841072
-
Reactively secure signature schemes
-
Proceedings of 6th Information Security Conference. (Springer Berlin)
-
M. Backes, B. Pfitzmann, M. Waidner, Reactively secure signature schemes, in Proceedings of 6th Information Security Conference. Lecture Notes in Computer Science, vol. 2851 (Springer, Berlin, 2003), pp. 84-95
-
(2003)
Lecture Notes in Computer Science
, vol.2851
, pp. 84-95
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
10
-
-
51249098563
-
-
Personal communication
-
R. Canetti, Personal communication, 2004
-
(2004)
-
-
Canetti, R.1
-
11
-
-
33845213035
-
Time-bounded task-pioas: A framework for analyzing security protocols
-
R. Canetti, L. Cheung, D.K. Kaynar, M. Liskov, N.A. Lynch, O. Pereira, R. Segala, Time-bounded task-pioas: a framework for analyzing security protocols, in DISC, 2006, pp. 238-253
-
(2006)
DISC
, pp. 238-253
-
-
Canetti, R.1
Cheung, L.2
Kaynar, D.K.3
Liskov, M.4
Lynch, N.A.5
Pereira, O.6
Segala, R.7
-
12
-
-
84880897758
-
Universally composable commitments
-
Proc. CRYPTO 2001, Santa Barbara, California. (Springer Berlin)
-
R. Canetti, M. Fischlin, Universally composable commitments, in Proc. CRYPTO 2001, Santa Barbara, California. Lecture Notes in Computer Science, vol. 2139 (Springer, Berlin, 2001), pp. 19-40
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 19-40
-
-
Canetti, R.1
Fischlin, M.2
-
13
-
-
84947232363
-
Universally composable notions of key exchange and secure channels
-
Advances in Cryptology-EUROCRYPT 2002. (Springer Berlin)
-
R. Canetti, H. Krawczyk, Universally composable notions of key exchange and secure channels, in Advances in Cryptology-EUROCRYPT 2002. Lecture Notes in Computer Science, vol. 2332 (Springer, Berlin, 2002), pp. 337-351
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 337-351
-
-
Canetti, R.1
Krawczyk, H.2
-
14
-
-
35248854495
-
On the limitations of universally composable two-party computation without set-up assumptions
-
Advances in Cryptology-EUROCRYPT 2003. (Springer Berlin)
-
R. Canetti, E. Kushilevitz, Y. Lindell, On the limitations of universally composable two-party computation without set-up assumptions, in Advances in Cryptology-EUROCRYPT 2003. Lecture Notes in Computer Science, vol. 2656 (Springer, Berlin, 2003), pp. 68-86
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 68-86
-
-
Canetti, R.1
Kushilevitz, E.2
Lindell, Y.3
-
15
-
-
0036038991
-
Universally composable two-party and multi-party secure computation
-
R. Canetti, Y. Lindell, R. Ostrovsky, A. Sahai, Universally composable two-party and multi-party secure computation, in Proc. ACM Symp. on the Theory of Computing, 2002, pp. 494-503
-
(2002)
Proc. ACM Symp. on the Theory of Computing
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
16
-
-
84864182023
-
-
Technical report 2006/153, Cryptology ePrint Archive
-
A. Datta, R. Küsters, J. Mitchell, A. Ramanathan, On the relationships between notions of simulation-based security. Technical report 2006/153, Cryptology ePrint Archive, 2006
-
(2006)
On the Relationships between Notions of Simulation-based Security
-
-
Datta, A.1
Küsters, R.2
Mitchell, J.3
Ramanathan, A.4
-
17
-
-
24144434371
-
On the relationships between notions of simulation-based security
-
Proceedings of the 2nd Theory of Cryptography Conference (TCC 2005), ed. by J. Kilian. (Springer Berlin)
-
A. Datta, R. Küsters, J.C. Mitchell, A. Ramanathan, On the relationships between notions of simulation-based security, in Proceedings of the 2nd Theory of Cryptography Conference (TCC 2005), ed. by J. Kilian. Lecture Notes in Computer Science, vol. 3378 (Springer, Berlin, 2005), pp. 476-494
-
(2005)
Lecture Notes in Computer Science
, vol.3378
, pp. 476-494
-
-
Datta, A.1
Küsters, R.2
Mitchell, J.C.3
Ramanathan, A.4
-
18
-
-
33947710767
-
Unifying equivalence-based definitions of protocol security
-
ACM SIGPLAN and IFIP WG 1.7 No formal proceedings
-
A. Datta, R. Küsters, J.C. Mitchell, A. Ramanathan, V. Shmatikov, Unifying equivalence-based definitions of protocol security, in ACM SIGPLAN and IFIP WG 1.7, 4th Workshop on Issues in the Theory of Security, 2004. No formal proceedings
-
(2004)
4th Workshop on Issues in the Theory of Security
-
-
Datta, A.1
Küsters, R.2
Mitchell, J.C.3
Ramanathan, A.4
Shmatikov, V.5
-
20
-
-
28144438404
-
Polynomial runtime in simulatability definitions
-
IEEE Computer Society Los Alamitos
-
D. Hofheinz, J. Müller-Quade, D. Unruh, Polynomial runtime in simulatability definitions, in 18th IEEE Computer Security Foundations Workshop (CSFW-18 2005) (IEEE Computer Society, Los Alamitos, 2005), pp. 156-169
-
(2005)
18th IEEE Computer Security Foundations Workshop (CSFW-18 2005)
, pp. 156-169
-
-
Hofheinz, D.1
Müller-Quade, J.2
Unruh, D.3
-
21
-
-
24144472250
-
Comparing two notions of simulatability
-
Theory of Cryptography, Proceedings of TCC 2005, ed. by J. Kilian. (Springer Berlin)
-
D. Hofheinz, D. Unruh, Comparing two notions of simulatability, in Theory of Cryptography, Proceedings of TCC 2005, ed. by J. Kilian. Lecture Notes in Computer Science, vol. 3378 (Springer, Berlin, 2005), pp. 86-103
-
(2005)
Lecture Notes in Computer Science
, vol.3378
, pp. 86-103
-
-
Hofheinz, D.1
Unruh, D.2
-
24
-
-
84958052989
-
Probabilistic polynomial-time equivalence and security protocols
-
Formal Methods World Congress, vol. I, Toulouse, France, ed. by J.M. Wing, J. Woodcock. (Springer Berlin)
-
P.D. Lincoln, J.C. Mitchell, M. Mitchell, A. Scedrov, Probabilistic polynomial-time equivalence and security protocols, in Formal Methods World Congress, vol. I, Toulouse, France, ed. by J.M. Wing, J. Woodcock. Lecture Notes in Computer Science, vol. 1708 (Springer, Berlin, 1999), pp. 776-793
-
(1999)
Lecture Notes in Computer Science
, vol.1708
, pp. 776-793
-
-
Lincoln, P.D.1
Mitchell, J.C.2
Mitchell, M.3
Scedrov, A.4
-
27
-
-
0032307051
-
A linguistic characterization of bounded oracle computation and probabilistic polynomial time
-
Palo Alto, California (IEEE, New York)
-
J.C. Mitchell, M. Mitchell, A. Scedrov, A linguistic characterization of bounded oracle computation and probabilistic polynomial time, in Proc. 39th Annual IEEE Symposium on the Foundations of Computer Science, Palo Alto, California (IEEE, New York, 1998), pp. 725-733
-
(1998)
Proc. 39th Annual IEEE Symposium on the Foundations of Computer Science
, pp. 725-733
-
-
Mitchell, J.C.1
Mitchell, M.2
Scedrov, A.3
-
28
-
-
1442267753
-
A probabilistic polynomial-time calculus for the analysis of cryptographic protocols (preliminary report)
-
17th Annual Conference on the Mathematical Foundations of Programming Semantics, Arhus, Denmark, May, 2001, ed. by S. Brookes, M. Mislove
-
J.C. Mitchell, A. Ramanathan, A. Scedrov, V. Teague, A probabilistic polynomial-time calculus for the analysis of cryptographic protocols (preliminary report), in 17th Annual Conference on the Mathematical Foundations of Programming Semantics, Arhus, Denmark, May, 2001, ed. by S. Brookes, M. Mislove. Electronic Notes in Theoretical Computer Science, vol. 45, 2001
-
(2001)
Electronic Notes in Theoretical Computer Science
, vol.45
-
-
Mitchell, J.C.1
Ramanathan, A.2
Scedrov, A.3
Teague, V.4
-
29
-
-
33244491452
-
A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols
-
1-3
-
J.C. Mitchell, A. Ramanathan, A. Scedrov, V. Teague, A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols, Theor. Comput. Sci. 353(1-3), 118-164 (2006)
-
(2006)
Theor. Comput. Sci.
, vol.353
, pp. 118-164
-
-
Mitchell, J.C.1
Ramanathan, A.2
Scedrov, A.3
Teague, V.4
-
30
-
-
0034823388
-
A model for asynchronous reactive systems and its application to secure message transmission
-
IEEE Computer Society Press Los Alamitos
-
B. Pfitzmann, M. Waidner, A model for asynchronous reactive systems and its application to secure message transmission, in IEEE Symposium on Security and Privacy (S&P 2001) (IEEE Computer Society Press, Los Alamitos, 2001), pp. 184-200
-
(2001)
IEEE Symposium on Security and Privacy (S&P 2001)
, pp. 184-200
-
-
Pfitzmann, B.1
Waidner, M.2
-
31
-
-
24144431795
-
-
Unpublished
-
A. Ramanathan, J.C. Mitchell, A. Scedrov, V. Teague, Probabilistic bisimulation and equivalence for security analysis of network protocols. Unpublished, see http://www-cs-students.stanford.edu/~ajith/, 2004
-
(2004)
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols
-
-
Ramanathan, A.1
Mitchell, J.C.2
Scedrov, A.3
Teague, V.4
-
32
-
-
35048876713
-
Probabilistic bisimulation and equivalence for security analysis of network protocols
-
FOSSACS 2004-Foundations of Software Science and Computation Structures. (Springer Berlin). Summarizes results in [31]
-
A. Ramanathan, J.C. Mitchell, A. Scedrov, V. Teague, Probabilistic bisimulation and equivalence for security analysis of network protocols, in FOSSACS 2004-Foundations of Software Science and Computation Structures. Lecture Notes in Computer Science, vol. 2987 (Springer, Berlin, 2004), pp. 468-483. Summarizes results in [31]
-
(2004)
Lecture Notes in Computer Science
, vol.2987
, pp. 468-483
-
-
Ramanathan, A.1
Mitchell, J.C.2
Scedrov, A.3
Teague, V.4
|