-
1
-
-
29144460434
-
On epistemic logic with justification
-
Singapore, July
-
S. Artemov and E. Nogina. On epistemic logic with justification. In Proceedings of TARK X, pages 279-294, Singapore, July 2005.
-
(2005)
Proceedings of TARK X
, pp. 279-294
-
-
Artemov, S.1
Nogina, E.2
-
2
-
-
84879078812
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
Proceedings of the IFIP International Conference on TCS (IFIP TCS2000)
-
Martin Abadi and Phillip Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). In Proceedings of the IFIP International Conference on TCS (IFIP TCS2000), volume 1872 of Lecture Notes in Computer Science, pages 3-22, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1872
, pp. 3-22
-
-
Abadi, M.1
Rogaway, P.2
-
4
-
-
0033698744
-
A Metanotation for Protocol Analysis
-
P. Syverson, editor, IEEE Computer Society Press
-
Iliano Cervesato, Nancy A. Durgin, Patrick D. Lincoln, John C. Mitchell, and Andre Scedrov. A Metanotation for Protocol Analysis. In P. Syverson, editor, Proceedings of the 12th IEEE Computer Security Foundations Workshop, pages 35-51. IEEE Computer Society Press, 1999.
-
(1999)
Proceedings of the 12th IEEE Computer Security Foundations Workshop
, pp. 35-51
-
-
Cervesato, I.1
Durgin, N.A.2
Lincoln, P.D.3
Mitchell, J.C.4
Scedrov, A.5
-
5
-
-
0020915882
-
Blind signatures for untraceable payments
-
Springer-Verlag
-
D. Chaum. Blind signatures for untraceable payments. In Advances in Cryptology - Crypto '82, pages 199-203. Springer-Verlag, 1983.
-
(1983)
Advances in Cryptology - Crypto '82
, pp. 199-203
-
-
Chaum, D.1
-
6
-
-
0022145479
-
SECURITY WITHOUT IDENTIFICATION: TRANSACTION SYSTEMS TO MAKE BIG BROTHER OBSOLETE.
-
DOI 10.1145/4372.4373
-
D. Chaum. Security without identification: transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030-1044, 1985. (Pubitemid 15587967)
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
7
-
-
77957576091
-
On Some Incompatible properties of Voting Schemes
-
Benoit Chevallier-Mames, Pierre-Alain Fouque, David Pointcheval, Julien Stern, and Jacques Traore. On Some Incompatible properties of Voting Schemes. In Proceedings of the IAVoSS Workshop on Trustworthy Elections, 2006.
-
Proceedings of the IAVoSS Workshop on Trustworthy Elections, 2006
-
-
Chevallier-Mames, B.1
Fouque, P.-A.2
Pointcheval, D.3
Stern, J.4
Traore, J.5
-
8
-
-
0012013903
-
Dolev-Yao is no better than Machiavelli
-
P. Degano, editor, July
-
Iliano Cervesato, Catherine A. Meadows, and Paul F. Syverson. Dolev-Yao is no better than Machiavelli. In P. Degano, editor, Proceedings of WITS'00, pages 87-92, July 2000.
-
(2000)
Proceedings of WITS'00
, pp. 87-92
-
-
Cervesato, I.1
Meadows, C.A.2
Syverson, P.F.3
-
9
-
-
33947622187
-
Coercion-Resistance and Receipt-Freeness in Electronic Voting
-
IEEE Computer Society
-
Stephanie Delaune, Steve Kremer, and Mark Ryan. Coercion-Resistance and Receipt-Freeness in Electronic Voting. In 19th Computer Security Foundations Workshop, pages 28-42. IEEE Computer Society, 2006.
-
(2006)
19th Computer Security Foundations Workshop
, pp. 28-42
-
-
Delaune, S.1
Kremer, S.2
Ryan, M.3
-
12
-
-
0001292443
-
A practical secret voting scheme for large scale elections
-
Atsushi Fujioka, Tatsuaki Okamoto, and Kaazuo Ohta. A practical secret voting scheme for large scale elections. In ASIACRYPT, pages 244-251, 1992.
-
(1992)
ASIACRYPT
, pp. 244-251
-
-
Fujioka, A.1
Okamoto, T.2
Ohta, K.3
-
13
-
-
24144492346
-
Anonymity and Information Hiding in Multiagent Systems
-
Joseph Y. Halpern and Kevin R. O'Neil. Anonymity and Information Hiding in Multiagent Systems. Journal of Computer Security, 13(3):483-512, 2005.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.3
, pp. 483-512
-
-
Halpern, J.Y.1
O'Neil, K.R.2
-
14
-
-
35248868917
-
Modeling adversaries in a logic for security protocol analysis
-
Formal Aspects of Security, First International Conference, FASec 2002
-
Joseph Y. Halpern and Riccardo Pucella. Modeling adversaries in a logic for security protocol analysis. In Formal Aspects of Security, First International Conference, FASec 2002, volume 2629 of Lecture Notes in Computer Science, pages 115-132, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2629
, pp. 115-132
-
-
Halpern, J.Y.1
Pucella, R.2
-
15
-
-
33750257357
-
Formalising Receipt-Freeness
-
Information Security Conference, Springer
-
Hugo Jonker and E.P. de Vink. Formalising Receipt-Freeness. In Information Security Conference, volume 4176 of Lecture Notes in Computer Science, pages 476-488. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4176
, pp. 476-488
-
-
Jonker, H.1
De Vink, E.P.2
-
17
-
-
23144432349
-
Analysis of an Electronic Voting Protocol in the Applied Pi Calculus
-
Proceedings of the European Symposium on Programming, Springer
-
Steve Kremer and Mark Ryan. Analysis of an Electronic Voting Protocol in the Applied Pi Calculus. In Proceedings of the European Symposium on Programming, volume 3444 of Lecture Notes in Computer Science, pages 186-200. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3444
, pp. 186-200
-
-
Kremer, S.1
Ryan, M.2
-
18
-
-
85007180552
-
Distributed Processes and the Logic of Knowledge
-
Rohit Parikh and R. Ramanujam. Distributed Processes and the Logic of Knowledge. In Logic of Programs, pages 256-268, 1985.
-
(1985)
Logic of Programs
, pp. 256-268
-
-
Parikh, R.1
Ramanujam, R.2
-
20
-
-
11944251803
-
Decidability of context-explicit security protocols
-
R. Ramanujam and S. P. Suresh. Decidability of context-explicit security protocols. Journal of Computer Security, 13(1):135-165, 2005. (Pubitemid 40099762)
-
(2005)
Journal of Computer Security
, vol.13
, Issue.1
, pp. 135-165
-
-
Ramanujam, R.1
Suresh, S.P.2
-
21
-
-
33751045375
-
A (restricted) quantifier elimination for security protocols
-
DOI 10.1016/j.tcs.2006.08.037, PII S0304397506005809
-
R. Ramanujam and S. P. Suresh. A (restricted) quantifier elimination for security protocols. Theoretical Computer Science, 367:228-256, 2006. (Pubitemid 44755017)
-
(2006)
Theoretical Computer Science
, vol.367
, Issue.1-2
, pp. 228-256
-
-
Ramanujam, R.1
Suresh, S.P.2
|