-
1
-
-
70649110129
-
-
available at
-
Appendices are available at, www.cse.unsw.edu.au/~carrollm/probs/ bibliographyBody.html#McIver:09
-
Appendices are
-
-
-
2
-
-
70649112421
-
-
Private communication February
-
Černý, P.: Private communication (February 2009)
-
(2009)
-
-
Černý, P.1
-
3
-
-
33746373966
-
Preserving secrecy under refinement
-
Bugliesi, M, Preneel, B, Sassone, V, Wegener, I, eds, ICALP 2006, Springer, Heidelberg
-
Alur, R., Černý, P., Zdancewic, S.: Preserving secrecy under refinement. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 107-118. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4052
, pp. 107-118
-
-
Alur, R.1
Černý, P.2
Zdancewic, S.3
-
4
-
-
51849143985
-
-
Bogetoft, P., Christensen, D.L., Damgård, I., Geisler, M., Jakobsen, T., Krøigaard, M., Nielsen, J.D., Nielsen, J.B., Nielsen, K., Pagter, J., Schwartzbach, M., Toft, T.: Secure multiparty computation goes live, http://eprint.iacr.org/2008/068
-
Secure multiparty computation goes live
-
-
Bogetoft, P.1
Christensen, D.L.2
Damgård, I.3
Geisler, M.4
Jakobsen, T.5
Krøigaard, M.6
Nielsen, J.D.7
Nielsen, J.B.8
Nielsen, K.9
Pagter, J.10
Schwartzbach, M.11
Toft, T.12
-
5
-
-
50349096677
-
-
Coble, A.: Formalized information-theoretic proofs of privacy using the HOL-4 theorem-prover. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, 5134, pp. 77-98. Springer, Heidelberg (2008)
-
Coble, A.: Formalized information-theoretic proofs of privacy using the HOL-4 theorem-prover. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 77-98. Springer, Heidelberg (2008)
-
-
-
-
6
-
-
84937417656
-
-
Engelhardt, K., van der Meyden, R., Moses, Y.: A refinement theory that supports reasoning about knowledge and time. In: Nieuwenhuis, R., Voronkov, A. (eds.) LPAR 2001. LNCS (LNAI), 2250, pp. 125-141. Springer, Heidelberg (2001)
-
Engelhardt, K., van der Meyden, R., Moses, Y.: A refinement theory that supports reasoning about knowledge and time. In: Nieuwenhuis, R., Voronkov, A. (eds.) LPAR 2001. LNCS (LNAI), vol. 2250, pp. 125-141. Springer, Heidelberg (2001)
-
-
-
-
8
-
-
84985387198
-
A couple of novelties in the propositional calculus. Zeitschr für Math
-
Hoare, C.A.R.: A couple of novelties in the propositional calculus. Zeitschr für Math. Logik und Grundlagen der Math. 31(2), 173-178 (1985)
-
(1985)
Logik und Grundlagen der Math
, vol.31
, Issue.2
, pp. 173-178
-
-
Hoare, C.A.R.1
-
9
-
-
0033751850
-
A semantic approach to secure information flow
-
Leino, K.R.M., Joshi, R.: A semantic approach to secure information flow. Science of Computer Programming 37(1-3), 113-138 (2000)
-
(2000)
Science of Computer Programming
, vol.37
, Issue.1-3
, pp. 113-138
-
-
Leino, K.R.M.1
Joshi, R.2
-
10
-
-
85084163840
-
Fairplay - A secure two-party computation system
-
USENIX Association
-
Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay - A secure two-party computation system. In: Proc. 13th Conf. on USENIX Security Symposium. USENIX Association (2004)
-
(2004)
Proc. 13th Conf. on USENIX Security Symposium
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
11
-
-
0034836335
-
Preserving information flow properties under refinement
-
Mantel, H.: Preserving information flow properties under refinement. In: Proc. IEEE Symp. Security and Privacy, pp. 78-91 (2001)
-
(2001)
Proc. IEEE Symp. Security and Privacy
, pp. 78-91
-
-
Mantel, H.1
-
12
-
-
43049179674
-
Using probabilistic Kleene algebra pKA for protocol verification
-
McIver, A.K., Cohen, E., Morgan, C., Gonzalia, C.: Using probabilistic Kleene algebra pKA for protocol verification. Journal of Logic and Algebraic Programming 76(1), 90-111 (2008)
-
(2008)
Journal of Logic and Algebraic Programming
, vol.76
, Issue.1
, pp. 90-111
-
-
McIver, A.K.1
Cohen, E.2
Morgan, C.3
Gonzalia, C.4
-
13
-
-
70649091351
-
-
Morgan, C.C.: Programming from Specifications, 2nd edn. Prentice-Hall, Engle-wood Cliffs (1994), web.comlab.ox.ac.uk/oucl/publications/books/PfS/
-
Morgan, C.C.: Programming from Specifications, 2nd edn. Prentice-Hall, Engle-wood Cliffs (1994), web.comlab.ox.ac.uk/oucl/publications/books/PfS/
-
-
-
-
14
-
-
33746064873
-
-
Morgan, C.C.: The Shadow Knows: Refinement of ignorance in sequential programs. In: Uustalu, T. (ed.) Math. Prog. Construction. LNCS, 4014, pp. 359-378. Springer, Heidelberg (2006) Treats Dining Cryptographers
-
Morgan, C.C.: The Shadow Knows: Refinement of ignorance in sequential programs. In: Uustalu, T. (ed.) Math. Prog. Construction. LNCS, vol. 4014, pp. 359-378. Springer, Heidelberg (2006) Treats Dining Cryptographers
-
-
-
-
15
-
-
67349149975
-
The Shadow Knows: Refinement of ignorance in sequential programs
-
Treats Oblivious Transfer
-
Morgan, C.C.: The Shadow Knows: Refinement of ignorance in sequential programs. Science of Computer Programming 74(8) (2009) Treats Oblivious Transfer
-
(2009)
Science of Computer Programming
, vol.74
, Issue.8
-
-
Morgan, C.C.1
-
17
-
-
0003462641
-
How to exchange secrets by oblivious transfer
-
Technical Report TR-81, Harvard University
-
Rabin, M.O.: How to exchange secrets by oblivious transfer. Technical Report TR-81, Harvard University (1981), http://eprint.iacr.org/2005/187
-
(1981)
-
-
Rabin, M.O.1
-
18
-
-
0041965552
-
Unconditionally secure commitment and oblivious transfer schemes using private channels and a trusted initialiser
-
Technical report, M.I.T
-
Rivest, R.: Unconditionally secure commitment and oblivious transfer schemes using private channels and a trusted initialiser. Technical report, M.I.T (1999), http://theory.lcs.mit.edu/~rivest/Rivest-commitment.pdf
-
(1999)
-
-
Rivest, R.1
-
19
-
-
0003777431
-
-
Addison-Wesley, Reading
-
Ryan, P., Schneider, S., Goldsmith, M., Lowe, G., Roscoe, B.: Modelling and Analysis of Security Protocols. Addison-Wesley, Reading (2000)
-
(2000)
Modelling and Analysis of Security Protocols
-
-
Ryan, P.1
Schneider, S.2
Goldsmith, M.3
Lowe, G.4
Roscoe, B.5
-
22
-
-
70649092441
-
-
http://www.deploy-project.eu
-
-
-
|