-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
M. Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, 1999.
-
(1999)
Journal of the ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
0037432692
-
Secrecy types for asymmetric communication
-
Proc. 4th International Conference on Foundations of Software Science and Computation Structures FOSSACS, of, Springer-Verlag
-
M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. In Proc. 4th International Conference on Foundations of Software Science and Computation Structures (FOSSACS), volume 2030 of Lecture Notes in Computer Science, pages 25-41. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2030
, pp. 25-41
-
-
Abadi, M.1
Blanchet, B.2
-
4
-
-
34547517142
-
Just fast keying in the pi calculus
-
M. Abadi, B. Blanchet, and C. Fournet. Just fast keying in the pi calculus. ACM Transactions on Information and System Security, 10(3):9, 2007.
-
(2007)
ACM Transactions on Information and System Security
, vol.10
, Issue.3
, pp. 9
-
-
Abadi, M.1
Blanchet, B.2
Fournet, C.3
-
6
-
-
33644785297
-
Receipt-free homomorphic elections and write-in ballots. Cryptology ePrint Archive
-
Report 2004/105
-
A. Acquisti. Receipt-free homomorphic elections and write-in ballots. Cryptology ePrint Archive, Report 2004/105, 2004. http://eprint.iacr.org/.
-
(2004)
-
-
Acquisti, A.1
-
9
-
-
50249164303
-
Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol
-
To appear in
-
M. Backes, M. Maffei, and D. Unruh. Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol. To appear in IEEE Symposium on Security and Privacy, 2008.
-
(2008)
IEEE Symposium on Security and Privacy
-
-
Backes, M.1
Maffei, M.2
Unruh, D.3
-
10
-
-
2342466750
-
Hack-a-vote: Security issues with electronic voting systems
-
J. Bannet, D. W. Price, A. Rudys, J. Singer, and D. S. Wallach. Hack-a-vote: Security issues with electronic voting systems. IEEE Security & Privacy, 2(1):32-37, 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.1
, pp. 32-37
-
-
Bannet, J.1
Price, D.W.2
Rudys, A.3
Singer, J.4
Wallach, D.S.5
-
12
-
-
0034822279
-
An efficient cryptographic protocol verifier based on Prolog rules
-
IEEE Computer Society Press
-
B. Blanchet. An efficient cryptographic protocol verifier based on Prolog rules. In Proc. 14th IEEE Computer Security Foundations Workshop (CSFW), pages 82-96. IEEE Computer Society Press, 2001.
-
(2001)
Proc. 14th IEEE Computer Security Foundations Workshop (CSFW)
, pp. 82-96
-
-
Blanchet, B.1
-
14
-
-
24144452823
-
Static validation of security protocols
-
C. Bodei, M. Buchholtz, P. Degano, F. Nielson, and H. R. Nielson. Static validation of security protocols. Journal of Computer Security, 13(3):347-390, 2005.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.3
, pp. 347-390
-
-
Bodei, C.1
Buchholtz, M.2
Degano, P.3
Nielson, F.4
Nielson, H.R.5
-
15
-
-
34548820967
-
Dynamic types for authentication
-
M. Bugliesi, R. Focardi, and M. Maffei. Dynamic types for authentication. Journal of Computer Security, 15(6):563-617, 2007.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.6
, pp. 563-617
-
-
Bugliesi, M.1
Focardi, R.2
Maffei, M.3
-
18
-
-
38349000896
-
Symbolic bisimulation for the applied pi calculus. In In Proc. of Foundations of Software Technology and Theoretical Computer Science
-
27th International Conference FSTTCS, Springer-Verlag
-
S. Delaune, S. Kremer, and M. Ryan. Symbolic bisimulation for the applied pi calculus. In In Proc. of Foundations of Software Technology and Theoretical Computer Science, 27th International Conference (FSTTCS 2007), Lecture Notes in Computer Science, pages 133-145. Springer-Verlag, 2007.
-
(2007)
Lecture Notes in Computer Science
, pp. 133-145
-
-
Delaune, S.1
Kremer, S.2
Ryan, M.3
-
19
-
-
51749093902
-
-
S. Delaune, S. Kremer, and M. Ryan. Verifying privacytype properties of electronic voting protocols. Research Report LSV-08-01, Laboratoire Spécification et Vérification, ENS Cachan, France, 2008.
-
S. Delaune, S. Kremer, and M. Ryan. Verifying privacytype properties of electronic voting protocols. Research Report LSV-08-01, Laboratoire Spécification et Vérification, ENS Cachan, France, 2008.
-
-
-
-
21
-
-
4243198166
-
Voting and technology: Who gets to count your vote?
-
D. L. Dill, B. Schneier, and B. Simons. Voting and technology: who gets to count your vote? Communications of the ACM, 46(8):29-31, 2003.
-
(2003)
Communications of the ACM
, vol.46
, Issue.8
, pp. 29-31
-
-
Dill, D.L.1
Schneier, B.2
Simons, B.3
-
22
-
-
35048899619
-
Searching for shapes in cryptographic protocols
-
Proc. 13th International Conference on Tools and Algorithms for the Construction and Analysis of Systems TACAS, Springer-Verlag
-
S. Doghmi, J. Guttman, and F. Thayer. Searching for shapes in cryptographic protocols. In Proc. 13th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Lecture Notes in Computer Science, pages 523-538. Springer-Verlag, 2007.
-
(2007)
Lecture Notes in Computer Science
, pp. 523-538
-
-
Doghmi, S.1
Guttman, J.2
Thayer, F.3
-
23
-
-
2342559896
-
Election security: Perception and reality
-
D. Evans and N. Paul. Election security: Perception and reality. IEEE Security & Privacy, 2(1):24-31, 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.1
, pp. 24-31
-
-
Evans, D.1
Paul, N.2
-
24
-
-
3042660681
-
Types and effects for asymmetric cryptographic protocols
-
A. D. Gordon and A. Jeffrey. Types and effects for asymmetric cryptographic protocols. Journal of Computer Security, 12(3):435-484, 2004.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.3
, pp. 435-484
-
-
Gordon, A.D.1
Jeffrey, A.2
-
26
-
-
3543102147
-
Analysis of an electronic voting system
-
IEEE Computer Society Press
-
T. Kohno, A. Stubblefield, A. D. Rubin, and D. S. Wallach. Analysis of an electronic voting system. In Proc. 25th IEEE Symposium on Security & Privacy, pages 27-42. IEEE Computer Society Press, 2004.
-
(2004)
Proc. 25th IEEE Symposium on Security & Privacy
, pp. 27-42
-
-
Kohno, T.1
Stubblefield, A.2
Rubin, A.D.3
Wallach, D.S.4
-
27
-
-
74049150589
-
Robust coercion-resistant registration for remote e-voting
-
June 2007. Available at
-
T. Krivoruchko. Robust coercion-resistant registration for remote e-voting. IAVoSS Workshop On Trustworthy Elections (WOTE 2007), June 2007. Available at: http://research.microsoft.com/conferences/WOTE2007/papers/09.pdf.
-
(2007)
IAVoSS Workshop On Trustworthy Elections (WOTE
-
-
Krivoruchko, T.1
-
28
-
-
23144444779
-
Static validation of a voting protocol
-
Automated Reasoning for Security Protocol Analysis ARSPA 2005, of, Elsevier Science Publishers Ltd
-
C. R. Nielsen, E. H. Andersen, and H. R. Nielson. Static validation of a voting protocol. In Automated Reasoning for Security Protocol Analysis (ARSPA 2005), volume 135 of Electronic Notes on Theoretical Computer Science, pages 115-134. Elsevier Science Publishers Ltd., 2005.
-
(2005)
Electronic Notes on Theoretical Computer Science
, vol.135
, pp. 115-134
-
-
Nielsen, C.R.1
Andersen, E.H.2
Nielson, H.R.3
-
29
-
-
0041375490
-
Security considerations for remote electronic voting
-
A. D. Rubin. Security considerations for remote electronic voting. Communications of the ACM, 45(12):39-44, 2002.
-
(2002)
Communications of the ACM
, vol.45
, Issue.12
, pp. 39-44
-
-
Rubin, A.D.1
-
30
-
-
34548150987
-
On coercionresistant electronic elections with linear work
-
IEEE Computer Society Press
-
S. G. Weber, R. Araujo, and J. Buchmann. On coercionresistant electronic elections with linear work. In ARES '07: Proceedings of the The Second International Conference on Availability, Reliability and Security, pages 908-916. IEEE Computer Society Press, 2007.
-
(2007)
ARES '07: Proceedings of the The Second International Conference on Availability, Reliability and Security
, pp. 908-916
-
-
Weber, S.G.1
Araujo, R.2
Buchmann, J.3
-
31
-
-
0027205880
-
A semantic model for authentication protocols
-
IEEE Computer Society Press
-
T. Y. C. Woo and S. S. Lam. A semantic model for authentication protocols. In Proc. 14th IEEE Symposium on Security & Privacy, pages 178-194. IEEE Computer Society Press, 1993.
-
(1993)
Proc. 14th IEEE Symposium on Security & Privacy
, pp. 178-194
-
-
Woo, T.Y.C.1
Lam, S.S.2
|