메뉴 건너뛰기




Volumn , Issue , 2010, Pages 107-121

Analysing unlinkability and anonymity using the applied pi calculus

Author keywords

[No Author keywords available]

Indexed keywords

APPLIED PI CALCULUS; COMPLEMENTARY PROPERTY; E-PASSPORT; LINKABLE; THIRD PARTIES; UNLINKABILITY;

EID: 77957559043     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2010.15     Document Type: Conference Paper
Times cited : (116)

References (24)
  • 1
    • 77957601097 scopus 로고    scopus 로고
    • ISO 15408-2: Common criteria for information technology security evaluation - Part 2: Security functional components
    • July
    • ISO 15408-2: Common Criteria for Information Technology Security Evaluation - Part 2: Security functional components. Final draft, ISO/IEC, July 2009.
    • (2009) Final Draft, ISO/IEC
  • 2
    • 0035035153 scopus 로고    scopus 로고
    • Mobile values, new names, and secure communication
    • Martín Abadi and Cédric Fournet. Mobile values, new names, and secure communication. SIGPLAN Not., 36(3):104-115, 2001.
    • (2001) SIGPLAN Not. , vol.36 , Issue.3 , pp. 104-115
    • Abadi, M.1    Fournet, C.2
  • 5
    • 33745621564 scopus 로고    scopus 로고
    • Reducing time complexity in RFID systems
    • Bart Preneel and Stafford Tavares, Editors, Kingston, Canada, August, Volume 3897 of Lecture Notes in Computer Science
    • Gildas Avoine, Etienne Dysli, and Philippe Oechslin. Reducing time complexity in RFID systems. In Bart Preneel and Stafford Tavares, editors, Selected Areas in Cryptography - SAC 2005, volume 3897 of Lecture Notes in Computer Science, pages 291-306, Kingston, Canada, August 2005.
    • (2005) Selected Areas in Cryptography - SAC 2005 , pp. 291-306
    • Avoine, G.1    Dysli, E.2    Oechslin, P.3
  • 6
    • 34250013678 scopus 로고    scopus 로고
    • A face is exposed for aol searcher no. 4417749
    • August 9
    • Michael Barbaro and Tom Zeller Jr. A face is exposed for aol searcher no. 4417749. The New York Times, August 9, 2006.
    • (2006) The New York Times
    • Barbaro, M.1    Zeller Jr., T.2
  • 9
    • 77957585568 scopus 로고    scopus 로고
    • Christopher caldwell. A pass on privacy?
    • July 17
    • Christopher Caldwell. A pass on privacy? The New York Times, July 17, 2005.
    • (2005) The New York Times
  • 10
    • 33750561653 scopus 로고    scopus 로고
    • Analysing the MUTE anonymous file-sharing system using the pi-calculus
    • Springer, Volume 4229 of LNCS
    • Tom Chothia. Analysing the MUTE anonymous file-sharing system using the pi-calculus. In FORTE, volume 4229 of LNCS, pages 115- 130. Springer, 2006.
    • (2006) FORTE , pp. 115-130
    • Chothia, T.1
  • 12
  • 16
    • 20844459862 scopus 로고    scopus 로고
    • RFID privacy: An overview of problems and proposed solutions
    • Simson L. Garfinkel, Ari Juels, and Ravi Pappu. RFID privacy: An overview of problems and proposed solutions. IEEE Security and Privacy, 3(3):34-43, 2005.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.3 , pp. 34-43
    • Garfinkel, S.L.1    Juels, A.2    Pappu, R.3
  • 17
    • 77957552079 scopus 로고    scopus 로고
    • Defects in e-passports allow real-time tracking
    • 26th January
    • Dan Goodin. Defects in e-passports allow real-time tracking. The Register, 26th January 2010.
    • (2010) The Register
    • Goodin, D.1
  • 21
    • 37349045142 scopus 로고    scopus 로고
    • PKI for machine readable travel documents offering icc read-only access
    • PKI Task Force
    • PKI Task Force. PKI for machine readable travel documents offering icc read-only access. Technical report, International Civil Aviation Organization, 2004.
    • (2004) Technical Report, International Civil Aviation Organization
  • 24
    • 21144438831 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio
    • Hutter, D. Müller, G. Stephan, W. Ullman, M. eds.:, Boppard, Germany, Springer-Verlag, march, Volume 2802 of LNCS
    • Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest, and Daniel W. Engels. Security and privacy aspects of low-cost radio. In Hutter, D., Müller, G., Stephan, W., Ullman, M., eds.: International Conference on Security in Pervasive Computing - SPC 2003, volume 2802 of LNCS, Boppard, Germany, pages 454-469. Springer-Verlag, march 2003.
    • (2003) International Conference on Security in Pervasive Computing - SPC 2003 , pp. 454-469
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.