-
1
-
-
0042908709
-
Alternating-time temporal logic
-
AHK02
-
[AHK02] Alur, R., Henzinger, T.A., Kupferman, O.: Alternating-time temporal logic. Journal of the ACM 49(5), 672-713 (2002)
-
(2002)
Journal of the ACM
, vol.49
, Issue.5
, pp. 672-713
-
-
Alur, R.1
Henzinger, T.A.2
Kupferman, O.3
-
2
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
AR02
-
[AR02] Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology 15(2), 103-127 (2002)
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
3
-
-
0031650188
-
Asynchronous protocols for optimistic fair exchange
-
ASW98, IEEE Computer Society Press, Los Alamitos
-
[ASW98] Asokan, N., Shoup, V., Waidner, M.: Asynchronous protocols for optimistic fair exchange. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 86-99. IEEE Computer Society Press, Los Alamitos (1998)
-
(1998)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 86-99
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
4
-
-
70350423425
-
Computationally sound analysis of a probabilistic contract signing protocol
-
ASW09, Technical Report 0911, Institut für Informatik, Christian-Albrechts-Universität zu Kiel
-
[ASW09] Aizatulin, M., Schnoor, H., Wilke, T.: Computationally sound analysis of a probabilistic contract signing protocol. Technical Report 0911, Institut für Informatik, Christian-Albrechts-Universität zu Kiel (2009)
-
(2009)
-
-
Aizatulin, M.1
Schnoor, H.2
Wilke, T.3
-
5
-
-
33750447642
-
-
[BDD+06] Backes, M., Datta, A., Derek, A., Mitchell, J.C., Turuani, M.: Compositional analysis of contract-signing protocols. Theoretical Computer Science 367(1-2), 33-56 (2006)
-
[BDD+06] Backes, M., Datta, A., Derek, A., Mitchell, J.C., Turuani, M.: Compositional analysis of contract-signing protocols. Theoretical Computer Science 367(1-2), 33-56 (2006)
-
-
-
-
7
-
-
0025246897
-
Fair protocol for signing contracts
-
BOGMR90
-
[BOGMR90] Ben-Or, M., Goldreich, O., Micali, S., Rivest, R.L.: Fair protocol for signing contracts. IEEE Transactions on Information Theory 36(1), 40-46 (1990)
-
(1990)
IEEE Transactions on Information Theory
, vol.36
, Issue.1
, pp. 40-46
-
-
Ben-Or, M.1
Goldreich, O.2
Micali, S.3
Rivest, R.L.4
-
8
-
-
84945119254
-
Entity authentication and key distribution
-
BR93, Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
-
[BR93] Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
9
-
-
33745528593
-
-
[CH06] Canetti, R., Herzog, J.: Universally composable symbolic analysis of mutual authentication and key-exchange protocols. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 380-403. Springer, Heidelberg (2006)
-
[CH06] Canetti, R., Herzog, J.: Universally composable symbolic analysis of mutual authentication and key-exchange protocols. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 380-403. Springer, Heidelberg (2006)
-
-
-
-
10
-
-
84962447835
-
Computationally sound symbolic secrecy in the presence of hash functions
-
CKKW06, Arun-Kumar, S, Garg, N, eds, FSTTCS 2006, Springer, Heidelberg
-
[CKKW06] Cortier, V., Kremer, S., Küsters, R., Warinschi, B.: Computationally sound symbolic secrecy in the presence of hash functions. In: Arun-Kumar, S., Garg, N. (eds.) FSTTCS 2006. LNCS, vol. 4337, pp. 176-187. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4337
, pp. 176-187
-
-
Cortier, V.1
Kremer, S.2
Küsters, R.3
Warinschi, B.4
-
11
-
-
0035751922
-
Inductive methods and contract-signing protocols
-
CKS01
-
[CKS01] Chadha, R., Kanovich, M.I., Scedrov, A.: Inductive methods and contract-signing protocols. In: ACM Conference on Computer and Communications Security, pp. 176-185 (2001)
-
(2001)
ACM Conference on Computer and Communications Security
, pp. 176-185
-
-
Chadha, R.1
Kanovich, M.I.2
Scedrov, A.3
-
12
-
-
38049048838
-
A cryptographic model for branching time security properties-the case of contract signing protocols
-
CKW07, Biskup, J, López, J, eds, ESORICS 2007, Springer, Heidelberg
-
[CKW07] Cortier, V., Küsters, R., Warinschi, B.: A cryptographic model for branching time security properties-the case of contract signing protocols. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 422-437. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4734
, pp. 422-437
-
-
Cortier, V.1
Küsters, R.2
Warinschi, B.3
-
13
-
-
44049103684
-
-
[CL07] Chen, T., Lu, J.: Probabilistic alternating-time temporal logic and model checking algorithm. In: Lei, J. (ed.) FSKD (2), pp. 35-39. IEEE Computer Society Press, Los Alamitos (2007)
-
[CL07] Chen, T., Lu, J.: Probabilistic alternating-time temporal logic and model checking algorithm. In: Lei, J. (ed.) FSKD (2), pp. 35-39. IEEE Computer Society Press, Los Alamitos (2007)
-
-
-
-
14
-
-
20144361849
-
Contract signing, optimism, and advantage
-
CMSS05
-
[CMSS05] Chadha, R., Mitchell, J.C., Scedrov, A., Shmatikov, V.: Contract signing, optimism, and advantage. Journal of Logic and Algebraic Programming 64(2), 189-218 (2005)
-
(2005)
Journal of Logic and Algebraic Programming
, vol.64
, Issue.2
, pp. 189-218
-
-
Chadha, R.1
Mitchell, J.C.2
Scedrov, A.3
Shmatikov, V.4
-
16
-
-
84957060126
-
Abuse-free optimistic contract signing
-
GJM99, Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
-
[GJM99] Garay, J.A., Jakobsson, M., MacKenzie, P.D.: Abuse-free optimistic contract signing. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 449-466. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 449-466
-
-
Garay, J.A.1
Jakobsson, M.2
MacKenzie, P.D.3
-
17
-
-
70350381707
-
Infinite state AMC-model checking for cryptographic protocols. In: LICS
-
KKT07, Los Alamitos
-
[KKT07] Kähler, D., Küsters, R., Truderung, T.: Infinite state AMC-model checking for cryptographic protocols. In: LICS, pp. 181-192. IEEE Computer Society Press, Los Alamitos (2007)
-
(2007)
IEEE Computer Society Press
, pp. 181-192
-
-
Kähler, D.1
Küsters, R.2
Truderung, T.3
-
18
-
-
24144437134
-
Deciding properties of contractsigning protocols
-
KKW05, Diekert, V, Durand, B, eds, STACS 2005, Springer, Heidelberg
-
[KKW05] Kähler, D., Küsters, R., Wilke, T.: Deciding properties of contractsigning protocols. In: Diekert, V., Durand, B. (eds.) STACS 2005. LNCS, vol. 3404, pp. 158-169. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3404
, pp. 158-169
-
-
Kähler, D.1
Küsters, R.2
Wilke, T.3
-
20
-
-
0037937457
-
A game-based verification of non-repudiation and fair exchange protocols
-
KR03
-
[KR03] Kremer, S., Raskin, J.-F.: A game-based verification of non-repudiation and fair exchange protocols. Journal of Computer Security 11(3), 399-430 (2003)
-
(2003)
Journal of Computer Security
, vol.11
, Issue.3
, pp. 399-430
-
-
Kremer, S.1
Raskin, J.-F.2
-
21
-
-
0000619048
-
Extensive games and the problem of information
-
Kuh53
-
[Kuh53] Kuhn, H.W.: Extensive games and the problem of information. Annals of Mathematics Studies 28, 193-216 (1953)
-
(1953)
Annals of Mathematics Studies
, vol.28
, pp. 193-216
-
-
Kuhn, H.W.1
-
22
-
-
70350431681
-
-
[LM05] Lakhnech, Y., Mazaré, L.: Computationally sound verification of security protocols using Diffie-Hellman exponentiation. Technical report, Verimag (2005)
-
[LM05] Lakhnech, Y., Mazaré, L.: Computationally sound verification of security protocols using Diffie-Hellman exponentiation. Technical report, Verimag (2005)
-
-
-
-
23
-
-
0003960505
-
On the impossibility of fair exchange without a trusted third party
-
PG99, Technical report, Darmstadt University of Technology
-
[PG99] Pagnia, H., Gartner, F.C.: On the impossibility of fair exchange without a trusted third party. Technical report, Darmstadt University of Technology (1999)
-
(1999)
-
-
Pagnia, H.1
Gartner, F.C.2
|