-
2
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
Abadi M., and Gordon A.D. A calculus for cryptographic protocols: The spi calculus. Information and Computation 148 1 (1999) 1-70
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
3
-
-
84885216561
-
On the reachability problem in cryptographic protocols
-
Proceedings of CONCUR 00, Springer INRIA Research Report 3915, March 2000
-
Amadio R.M., and Lugiez D. On the reachability problem in cryptographic protocols. Proceedings of CONCUR 00. Lecture Notes in Computer Science vol. 1877 (2000), Springer INRIA Research Report 3915, March 2000
-
(2000)
Lecture Notes in Computer Science
, vol.1877
-
-
Amadio, R.M.1
Lugiez, D.2
-
4
-
-
41549128851
-
Formal approaches to information-hiding (tutorial)
-
Proceedings of the Third Symposium on Trustworthy Global Computing. Barthe G., and Fournet C. (Eds). TGC 2007, Springer
-
Beauxis R., Chatzikokolakis K., Palamidessi C., and Panangaden P. Formal approaches to information-hiding (tutorial). In: Barthe G., and Fournet C. (Eds). Proceedings of the Third Symposium on Trustworthy Global Computing. TGC 2007. Lecture Notes in Computer Science vol. 4912 (2008), Springer 347-362
-
(2008)
Lecture Notes in Computer Science
, vol.4912
, pp. 347-362
-
-
Beauxis, R.1
Chatzikokolakis, K.2
Palamidessi, C.3
Panangaden, P.4
-
5
-
-
27244455746
-
Probabilistic anonymity
-
Proceedings of CONCUR. Abadi M., and de Alfaro L. (Eds), Springer
-
Bhargava M., and Palamidessi C. Probabilistic anonymity. In: Abadi M., and de Alfaro L. (Eds). Proceedings of CONCUR. Lecture Notes in Computer Science vol. 3653 (2005), Springer 171-185. http://www.lix.polytechnique.fr/catuscia/papers/Anonymity/concur.pdf
-
(2005)
Lecture Notes in Computer Science
, vol.3653
, pp. 171-185
-
-
Bhargava, M.1
Palamidessi, C.2
-
6
-
-
0001645384
-
Some congruence properties for π-calculus bisimilarities
-
Boreale M., and Sangiorgi D. Some congruence properties for π-calculus bisimilarities. Theoretical Computer Science 198 1-2 (1998) 159-176
-
(1998)
Theoretical Computer Science
, vol.198
, Issue.1-2
, pp. 159-176
-
-
Boreale, M.1
Sangiorgi, D.2
-
7
-
-
68949207198
-
Bisimulation for demonic schedulers
-
Proceedings of the Twelfth International Conference on Foundations of Software Science and Computation Structures. De Alfaro L. (Ed). FOSSACS 2009, York, UK, March 2009, Springer
-
Chatzikokolakis K., Norman G., and Parker D. Bisimulation for demonic schedulers. In: De Alfaro L. (Ed). Proceedings of the Twelfth International Conference on Foundations of Software Science and Computation Structures. FOSSACS 2009, York, UK, March 2009. Lecture Notes in Computer Science vol. 5504 (2009), Springer 318-332
-
(2009)
Lecture Notes in Computer Science
, vol.5504
, pp. 318-332
-
-
Chatzikokolakis, K.1
Norman, G.2
Parker, D.3
-
8
-
-
38149090986
-
Making random choices invisible to the scheduler
-
Proceedings of CONCUR'07. Caires L., and Vasconcelos V.T. (Eds), Springer
-
Chatzikokolakis K., and Palamidessi C. Making random choices invisible to the scheduler. In: Caires L., and Vasconcelos V.T. (Eds). Proceedings of CONCUR'07. Lecture Notes in Computer Science vol. 4703 (2007), Springer 42-58. http://www.lix.polytechnique.fr/catuscia/papers/Scheduler/report.pdf
-
(2007)
Lecture Notes in Computer Science
, vol.4703
, pp. 42-58
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
-
9
-
-
40149107259
-
Anonymity protocols as noisy channels
-
Chatzikokolakis K., Palamidessi C., and Panangaden P. Anonymity protocols as noisy channels. Information and Computation 206 2-4 (2008) 378-401. http://www.lix.polytechnique.fr/catuscia/papers/Anonymity/Channels/full.pdf
-
(2008)
Information and Computation
, vol.206
, Issue.2-4
, pp. 378-401
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
Panangaden, P.3
-
11
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
Chaum D. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology 1 (1988) 65-75
-
(1988)
Journal of Cryptology
, vol.1
, pp. 65-75
-
-
Chaum, D.1
-
12
-
-
33744479345
-
Freenet: A distributed anonymous information storage and retrieval system
-
Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, Springer
-
Clarke I., Sandberg O., Wiley B., and Hong T.W. Freenet: A distributed anonymous information storage and retrieval system. Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability. Lecture Notes in Computer Science vol. 2009 (2000), Springer 44-66
-
(2000)
Lecture Notes in Computer Science
, vol.2009
, pp. 44-66
-
-
Clarke, I.1
Sandberg, O.2
Wiley, B.3
Hong, T.W.4
-
13
-
-
84957800033
-
Towards measuring anonymity
-
Proceedings of the Workshop on Privacy Enhancing Technologies. Dingledine R., and Syverson P.F. (Eds). PET 2002, Springer
-
Díaz C., Seys S., Claessens J., and Preneel B. Towards measuring anonymity. In: Dingledine R., and Syverson P.F. (Eds). Proceedings of the Workshop on Privacy Enhancing Technologies. PET 2002. Lecture Notes in Computer Science vol. 2482 (2002), Springer 54-68
-
(2002)
Lecture Notes in Computer Science
, vol.2482
, pp. 54-68
-
-
Díaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
14
-
-
0001206510
-
Coarsening at random: Characterizations, conjectures and counterexamples
-
Proceedings of the First Seattle Symposium in Biostatistics. Lin D.Y., and Fleming T.R. (Eds), Springer
-
Gill R.D., van der Laan M., and Robins J. Coarsening at random: Characterizations, conjectures and counterexamples. In: Lin D.Y., and Fleming T.R. (Eds). Proceedings of the First Seattle Symposium in Biostatistics. Lecture Notes in Statistics (1997), Springer 255-294
-
(1997)
Lecture Notes in Statistics
, pp. 255-294
-
-
Gill, R.D.1
van der Laan, M.2
Robins, J.3
-
16
-
-
24144492346
-
Anonymity and information hiding in multiagent systems
-
Halpern J.Y., and O'Neill K.R. Anonymity and information hiding in multiagent systems. Journal of Computer Security 13 3 (2005) 483-512
-
(2005)
Journal of Computer Security
, vol.13
, Issue.3
, pp. 483-512
-
-
Halpern, J.Y.1
O'Neill, K.R.2
-
17
-
-
84878650387
-
Probabilistic asynchronous π-calculus
-
Proceedings of FOSSACS 2000 (Part of ETAPS 2000). Tiuryn J. (Ed), Springer
-
Herescu O.M., and Palamidessi C. Probabilistic asynchronous π-calculus. In: Tiuryn J. (Ed). Proceedings of FOSSACS 2000 (Part of ETAPS 2000). Lecture Notes in Computer Science vol. 1784 (2000), Springer 146-160. http://www.lix.polytechnique.fr/~catuscia/papers/Prob_asy_pi/fossacs.ps
-
(2000)
Lecture Notes in Computer Science
, vol.1784
, pp. 146-160
-
-
Herescu, O.M.1
Palamidessi, C.2
-
19
-
-
0344875575
-
Information hiding, anonymity and privacy: A modular approach
-
Hughes D., and Shmatikov V. Information hiding, anonymity and privacy: A modular approach. Journal of Computer Security 12 1 (2004) 3-36
-
(2004)
Journal of Computer Security
, vol.12
, Issue.1
, pp. 3-36
-
-
Hughes, D.1
Shmatikov, V.2
-
20
-
-
23144432349
-
Analysis of an electronic voting protocol in the applied pi-calculus
-
Programming Languages and Systems - Proceedings of the 14th European Symposium on Programming. Sagiv M. (Ed). ESOP'05, Springer, Edinburgh, U.K.
-
Kremer S., and Ryan M.D. Analysis of an electronic voting protocol in the applied pi-calculus. In: Sagiv M. (Ed). Programming Languages and Systems - Proceedings of the 14th European Symposium on Programming. ESOP'05. Lecture Notes in Computer Science vol. 3444 (2005), Springer, Edinburgh, U.K. 186-200
-
(2005)
Lecture Notes in Computer Science
, vol.3444
, pp. 186-200
-
-
Kremer, S.1
Ryan, M.D.2
-
21
-
-
0031633395
-
Casper: A compiler for the analysis of security protocols
-
Proceedings of 10th IEEE Computer Security Foundations Workshop, 1997
-
Lowe G. Casper: A compiler for the analysis of security protocols. Proceedings of 10th IEEE Computer Security Foundations Workshop, 1997. Journal of Computer Security 6 (1998) 53-84
-
(1998)
Journal of Computer Security
, vol.6
, pp. 53-84
-
-
Lowe, G.1
-
22
-
-
33846535380
-
Assessing security threats of looping constructs
-
Hofmann M., and Felleisen M. (Eds). POPL 2007, Nice, France, 17-19 January, 2007, ACM
-
Malacaria P. Assessing security threats of looping constructs. In: Hofmann M., and Felleisen M. (Eds). Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. POPL 2007, Nice, France, 17-19 January, 2007 (2007), ACM 225-235
-
(2007)
Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 225-235
-
-
Malacaria, P.1
-
23
-
-
57349116220
-
Lagrange multipliers and maximum information leakage in different observational models
-
Erlingsson Ú., and Pistoia M. (Eds). PLAS 2008, ACM, Tucson, AZ, USA
-
Malacaria P., and Chen H. Lagrange multipliers and maximum information leakage in different observational models. In: Erlingsson Ú., and Pistoia M. (Eds). Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security. PLAS 2008 (2008), ACM, Tucson, AZ, USA 135-146
-
(2008)
Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security
, pp. 135-146
-
-
Malacaria, P.1
Chen, H.2
-
25
-
-
44049113210
-
A calculus of mobile processes, I and II
-
41-77. A preliminary version appeared as Technical Reports ECF-LFCS-89-85 and -86, University of Edinburgh, 1989
-
Milner R., Parrow J., and Walker D. A calculus of mobile processes, I and II. Information and Computation 100 1 (1992) 1-40 41-77. A preliminary version appeared as Technical Reports ECF-LFCS-89-85 and -86, University of Edinburgh, 1989
-
(1992)
Information and Computation
, vol.100
, Issue.1
, pp. 1-40
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
27
-
-
17944377470
-
A randomized encoding of the π-calculus with mixed choice
-
Palamidessi C., and Herescu O.M. A randomized encoding of the π-calculus with mixed choice. Theoretical Computer Science 335 2-3 (2005) 373-404. http://www.lix.polytechnique.fr/~catuscia/papers/prob_enc/report.pdf
-
(2005)
Theoretical Computer Science
, vol.335
, Issue.2-3
, pp. 373-404
-
-
Palamidessi, C.1
Herescu, O.M.2
-
31
-
-
0030260547
-
π-calculus, internal mobility and agent-passing calculi
-
Sangiorgi D. π-calculus, internal mobility and agent-passing calculi. Theoretical Computer Science 167 1-2 (1996) 235-274
-
(1996)
Theoretical Computer Science
, vol.167
, Issue.1-2
, pp. 235-274
-
-
Sangiorgi, D.1
-
33
-
-
84949756689
-
CSP and anonymity
-
Proc. of the European Symposium on Research in Computer Security. ESORICS, Springer
-
Schneider S., and Sidiropoulos A. CSP and anonymity. Proc. of the European Symposium on Research in Computer Security. ESORICS. Lecture Notes in Computer Science vol. 1146 (1996), Springer 198-218
-
(1996)
Lecture Notes in Computer Science
, vol.1146
, pp. 198-218
-
-
Schneider, S.1
Sidiropoulos, A.2
-
34
-
-
0001609136
-
Probabilistic simulations for probabilistic processes
-
An extended abstract appeared in: Proceedings of CONCUR'94, in: LNCS, vol. 836, pp. 481-496
-
Segala R., and Lynch N. Probabilistic simulations for probabilistic processes. Nordic Journal of Computing 2 2 (1995) 250-273 An extended abstract appeared in: Proceedings of CONCUR'94, in: LNCS, vol. 836, pp. 481-496
-
(1995)
Nordic Journal of Computing
, vol.2
, Issue.2
, pp. 250-273
-
-
Segala, R.1
Lynch, N.2
-
35
-
-
84957802536
-
Towards an information theoretic metric for anonymity
-
Proceedings of the Workshop on Privacy Enhancing Technologies. Dingledine R., and Syverson P.F. (Eds). PET 2002, Springer
-
Serjantov A., and Danezis G. Towards an information theoretic metric for anonymity. In: Dingledine R., and Syverson P.F. (Eds). Proceedings of the Workshop on Privacy Enhancing Technologies. PET 2002. Lecture Notes in Computer Science vol. 2482 (2002), Springer 41-53
-
(2002)
Lecture Notes in Computer Science
, vol.2482
, pp. 41-53
-
-
Serjantov, A.1
Danezis, G.2
-
36
-
-
68549087948
-
On the foundations of quantitative information flow
-
Proceedings of the Twelfth International Conference on Foundations of Software Science and Computation Structures. De Alfaro L. (Ed). FOSSACS 2009, Springer, York, UK
-
Smith G. On the foundations of quantitative information flow. In: De Alfaro L. (Ed). Proceedings of the Twelfth International Conference on Foundations of Software Science and Computation Structures. FOSSACS 2009. Lecture Notes in Computer Science vol. 5504 (2009), Springer, York, UK 288-302
-
(2009)
Lecture Notes in Computer Science
, vol.5504
, pp. 288-302
-
-
Smith, G.1
-
37
-
-
84924758404
-
Group principals and the formalization of anonymity
-
Paul F. Syverson, Stuart G. Stubblebine, Group principals and the formalization of anonymity, in: World Congress on Formal Methods, vol. 1, 1999, pp. 814-833
-
(1999)
World Congress on Formal Methods
, vol.1
, pp. 814-833
-
-
Syverson, P.F.1
Stubblebine, S.G.2
-
38
-
-
0030676973
-
Anonymous connections and onion routing
-
Oakland, California
-
P.F. Syverson, D.M. Goldschlag, M.G. Reed, Anonymous connections and onion routing, in: IEEE Symposium on Security and Privacy, Oakland, California, 1997, pp. 44-54
-
(1997)
IEEE Symposium on Security and Privacy
, pp. 44-54
-
-
Syverson, P.F.1
Goldschlag, D.M.2
Reed, M.G.3
|