-
1
-
-
0030643343
-
A calculus for cryptographic protocols: The spi calculus
-
Zurich, Apr. 1-4, Switzerland, New York, pp
-
Abadi, M. and A. D. Gordon, 1997. A calculus for cryptographic protocols: The spi calculus. Proceedings of the 4th ACM Conference on Computer and Communications Security, Zurich, Apr. 1-4, Switzerland, New York, pp:36-47.
-
(1997)
Proceedings of the 4th ACM Conference on Computer and Communications Security
, pp. 36-47
-
-
Abadi, M.1
Gordon, A.D.2
-
2
-
-
0035035153
-
Mobile values, new names and secure communication
-
London, UK, March, ACM New York, USA, pp
-
Abadi, M. and C. Fournet, 2001. Mobile values, new names and secure communication. Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, London, UK., March 2001, ACM New York, USA., pp:104-115.
-
(2001)
Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
4
-
-
84958778419
-
On a limitation of BAN logic
-
Norway, pp
-
Boyd, C. and W. Mao, 1994. On a limitation of BAN logic. Proceedings of Advances in Cryptology-EUROCRYPT'93, May 23-27, Lofthus, Norway, pp:240-247.
-
(1994)
Proceedings of Advances in Cryptology-EUROCRYPT'93, May 23-27, Lofthus
, pp. 240-247
-
-
Boyd, C.1
Mao, W.2
-
6
-
-
33947622187
-
Coercionresistance and receipt-freeness in electronic voting protocol
-
July 5-7, Venice, Italy, pp
-
Delaune, S., S. Kremer and M. D. Ryan, 2006. Coercionresistance and receipt-freeness in electronic voting protocol. Proceedings of 19th IEEE Computer Security Foundations Workshop, July 5-7, Venice, Italy, pp:28-42.
-
(2006)
Proceedings of 19th IEEE Computer Security Foundations Workshop
, pp. 28-42
-
-
Delaune, S.1
Kremer, S.2
Ryan, M.D.3
-
8
-
-
0031632567
-
Concurrent zeroknowledge
-
USA, pp
-
Dwork, C, M. Naor and A. Sahai, 1998. Concurrent zeroknowledge. Proceedings of the 30th Annual ACM Symposium on Theory of Computing, 1998, USA., pp:409-418.
-
(1998)
Proceedings of the 30th Annual ACM Symposium on Theory of Computing
, pp. 409-418
-
-
Dwork, C.1
Naor, M.2
Sahai, A.3
-
9
-
-
0037019232
-
Deniable authentication protocol based on Diffie-Hellman algorithm
-
Fan, L., C. X. Xu and J. H. Li, 2002. Deniable authentication protocol based on Diffie-Hellman algorithm. Elect. Lett, 38:705-706.
-
(2002)
Elect. Lett
, vol.38
, pp. 705-706
-
-
Fan, L.1
Xu, C.X.2
Li, J.H.3
-
10
-
-
37349038164
-
Universally composable security concurrent deniable authentication based on witness indistinguishable
-
Feng, T. and J. F. Ma, 2007. Universally composable security concurrent deniable authentication based on witness indistinguishable. J. Software, 18:2871-2881.
-
(2007)
J. Software
, vol.18
, pp. 2871-2881
-
-
Feng, T.1
Ma, J.F.2
-
11
-
-
67651035866
-
-
Han, S., W. Q. Liu and E. Chang, 2005. Deniable authentication protocol resisting man-in-the-middle attack. Proceedings of world Academy of Science, Engineering and Technology, Jan. 2005, PWASET, pp:1-4.
-
Han, S., W. Q. Liu and E. Chang, 2005. Deniable authentication protocol resisting man-in-the-middle attack. Proceedings of world Academy of Science, Engineering and Technology, Jan. 2005, PWASET, pp:1-4.
-
-
-
-
13
-
-
33750257357
-
Formalising Receipt-freeness
-
Greece, pp
-
Jonker Hugo, L., V. de and P. Erik, 2006. Formalising Receipt-freeness. Proceedings of the 9th International Conference on Information Security, Aug. 30-Sept. 2, Samos Island, Greece, pp:476-488.
-
(2006)
Proceedings of the 9th International Conference on Information Security, Aug. 30-Sept. 2, Samos Island
, pp. 476-488
-
-
Jonker Hugo, L.1
de, V.2
Erik, P.3
-
14
-
-
33745689203
-
Accountability in electronic commerce protocols
-
Kailar, R., 1996. Accountability in electronic commerce protocols. IEEE Trans. Software Eng., 22:313-328.
-
(1996)
IEEE Trans. Software Eng
, vol.22
, pp. 313-328
-
-
Kailar, R.1
-
15
-
-
84958771467
-
A sound logic for analyzing electronic commerce protocols
-
Sept. 16-18, London, pp
-
Kessler, V. and H. Neumann, 1998. A sound logic for analyzing electronic commerce protocols. Proceedings of the 5th European Symposium on Research in Computer Security, Sept. 16-18, London, pp:345-360.
-
(1998)
Proceedings of the 5th European Symposium on Research in Computer Security
, pp. 345-360
-
-
Kessler, V.1
Neumann, H.2
-
16
-
-
23144432349
-
Analysis of an electronic voting protocol in the applied Pi calculus
-
Kremer, S. and M. D. Ryan, 2005. Analysis of an electronic voting protocol in the applied Pi calculus. Lect. Notes Comput. Sci., 3444:186-200.
-
(2005)
Lect. Notes Comput. Sci
, vol.3444
, pp. 186-200
-
-
Kremer, S.1
Ryan, M.D.2
-
17
-
-
33845950814
-
A novel deniable authentication protocol using generalized El Gamal signature scheme
-
Lee, W. B., C. C. Wu and W. J. Tsaur, 2007. A novel deniable authentication protocol using generalized El Gamal signature scheme. Inform. Sci., 177:1376-1381.
-
(2007)
Inform. Sci
, vol.177
, pp. 1376-1381
-
-
Lee, W.B.1
Wu, C.C.2
Tsaur, W.J.3
-
18
-
-
26044448602
-
A new deniable authentication protocol from bilinear pairings
-
Lu, R. and Z. Cao, 2005a. A new deniable authentication protocol from bilinear pairings. Applied Math. Comput, 168:954-961.
-
(2005)
Applied Math. Comput
, vol.168
, pp. 954-961
-
-
Lu, R.1
Cao, Z.2
-
19
-
-
14844309431
-
Non-interactive deniable authentication protocol based on factoring
-
Lu, R. and Z. Cao, 2005b. Non-interactive deniable authentication protocol based on factoring. Comput. Standards Interfaces, 27:401-405.
-
(2005)
Comput. Standards Interfaces
, vol.27
, pp. 401-405
-
-
Lu, R.1
Cao, Z.2
-
20
-
-
30944439858
-
The practical detailed requirements of accountability and its application in the electronic payment protocols
-
Mar. 29-Apr. 1, Acadmic Press, pp
-
Meng, B., H. Zhang and Q. Xiong, 2005. The practical detailed requirements of accountability and its application in the electronic payment protocols. Proceedings of the 2005 IEEE international Conference on E-Technology, E-Commerce and E-Service, Mar. 29-Apr. 1, Acadmic Press, pp:556-561.
-
(2005)
Proceedings of the 2005 IEEE international Conference on E-Technology, E-Commerce and E-Service
, pp. 556-561
-
-
Meng, B.1
Zhang, H.2
Xiong, Q.3
-
21
-
-
49049110480
-
Analysis of internet voting protocols with jonker-vink receipt freeness formal model
-
Nov. 21-23, ICCIT, IEEE Computer Society, Washington, DC, pp
-
Meng, B., 2007. Analysis of internet voting protocols with jonker-vink receipt freeness formal model. Proceedings of the 2007 international Conference on Convergence information Technology, Nov. 21-23, ICCIT., IEEE Computer Society, Washington, DC, pp:663-669.
-
(2007)
Proceedings of the 2007 international Conference on Convergence information Technology
, pp. 663-669
-
-
Meng, B.1
-
22
-
-
57249084061
-
-
Meng, B., 2008. Formal analysis of key properties in the internet voting protocol using applied pi calculus. Inform. Technol. J., 7:1133-1140.
-
Meng, B., 2008. Formal analysis of key properties in the internet voting protocol using applied pi calculus. Inform. Technol. J., 7:1133-1140.
-
-
-
-
23
-
-
67651029682
-
A formal logic framework for receipt-freeness in internet voting protocol
-
Meng, B., 2009a. A formal logic framework for receipt-freeness in internet voting protocol. J. Comput, 4:184-192.
-
(2009)
J. Comput
, vol.4
, pp. 184-192
-
-
Meng, B.1
-
24
-
-
62749124406
-
-
Meng, B., 2009b. A secure non-interactive deniable authentication protocol with strong deniability based on discrete logarithm problem and its application on Internet voting protocol. Inform. Technol. J., 8:302-309.
-
Meng, B., 2009b. A secure non-interactive deniable authentication protocol with strong deniability based on discrete logarithm problem and its application on Internet voting protocol. Inform. Technol. J., 8:302-309.
-
-
-
-
25
-
-
0030705405
-
Automated analysis of cryptographic protocols using Mur
-
May 04-07, Digital Library, pp
-
Mitchell, J. C., M. Mitchell and U. Stern, 1997. Automated analysis of cryptographic protocols using Mur. Proceedings of the 1997 IEEE Symposium on Security and Privacy, May 04-07, Digital Library, pp. 141-141.
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 141-141
-
-
Mitchell, J.C.1
Mitchell, M.2
Stern, U.3
-
26
-
-
33746912795
-
Efficient non-interactive deniable authentication protocols
-
Sept. 21-23, IEEE Computer Society Washington, DC. USA, pp
-
Qian, H. F., Z. F. Cao, L. C. Wang and Q. S. Xue, 2005. Efficient non-interactive deniable authentication protocols. Proceedings of the 5th International Conference on Computer and Information Technology, Sept. 21-23, IEEE Computer Society Washington, DC. USA., pp:673-679.
-
(2005)
Proceedings of the 5th International Conference on Computer and Information Technology
, pp. 673-679
-
-
Qian, H.F.1
Cao, Z.F.2
Wang, L.C.3
Xue, Q.S.4
-
27
-
-
33745767675
-
New approaches for deniable authentication
-
Nov. 7-11, ACM Press, New York, pp
-
Raimondo, M. D. and R. Gennaro, 2005. New approaches for deniable authentication. Proceedings of the 12th ACM Conference on Computer and Communications Security, Nov. 7-11, ACM Press, New York, pp:112-121.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security
, pp. 112-121
-
-
Raimondo, M.D.1
Gennaro, R.2
-
28
-
-
2342455866
-
Efficient deniable authentication protocol based on generalized ElGamal signature scheme
-
Shao, Z., 2004. Efficient deniable authentication protocol based on generalized ElGamal signature scheme. Comput. Standards Interfaces, 26:449-454.
-
(2004)
Comput. Standards Interfaces
, vol.26
, pp. 449-454
-
-
Shao, Z.1
-
29
-
-
15544375802
-
Identity-based deniable authentication protocol
-
Shi, Y. and J. Li, 2005. Identity-based deniable authentication protocol. Elect. Lett., 41:241-242.
-
(2005)
Elect. Lett
, vol.41
, pp. 241-242
-
-
Shi, Y.1
Li, J.2
-
30
-
-
0031676397
-
Strand space: Why is a security protocol correct?
-
ACM, USA, pp
-
Thayer, F., J. C. Herzog and J. D. Guttman, 1998. Strand space: Why is a security protocol correct? Proceedings of the 1998 IEEE Symposium on Security and Privacy, 1998, ACM, USA., pp:160-171.
-
(1998)
Proceedings of the 1998 IEEE Symposium on Security and Privacy
, pp. 160-171
-
-
Thayer, F.1
Herzog, J.C.2
Guttman, J.D.3
|