-
2
-
-
0031642585
-
A modular approach to the design and analysis of authentication and key exchange protocols
-
Dallas, Texas, United States
-
Bellare, M., R. Canetti and H. Krawczyk, 1998. A modular approach to the design and analysis of authentication and key exchange protocols. Proceedings of the 30th Annual Symposium on the Theory of Computing, (ASTC'98), Dallas, Texas, United States, pp: 419-428.
-
(1998)
Proceedings of the 30th Annual Symposium on the Theory of Computing, (ASTC'98)
, pp. 419-428
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
4
-
-
57849106656
-
Cryptographically verified implementations for TLS
-
Oct. 27-31, Alexandria, Virginia, USA
-
Bhargavan, K., R. Corin, C. Fournet and E. Zalinescu, 2008. Cryptographically verified implementations for TLS. Proceedings of the 15th ACM Conference on Computer and Communications Security, Oct. 27-31, Alexandria, Virginia, USA., pp: 459-468.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 459-468
-
-
Bhargavan, K.1
Corin, R.2
Fournet, C.3
Zalinescu, E.4
-
5
-
-
33749579704
-
Automated security proofs with sequences of games
-
Aug. 06, LNCS, Santa Barbara, CA, Springer Verlag
-
Blanchet, B. and D. Pointcheval, 2006. Automated security proofs with sequences of games. Proceedings of the 27th IEEE Symposium on Security, Aug. 06, LNCS, Santa Barbara, CA, Springer Verlag, pp: 537-554.
-
(2006)
Proceedings of the 27th IEEE Symposium on Security
, pp. 537-554
-
-
Blanchet, B.1
Pointcheval, D.2
-
6
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
June 11-13, IEEE Computer Society, Washington, DC
-
Blanchet, B., 2001. An efficient cryptographic protocol verifier based on prolog rules. Proceedings of the 14th IEEE Workshop on Computer Security Foundations, June 11-13, IEEE Computer Society, Washington, DC, pp: 82-96.
-
(2001)
Proceedings of the 14th IEEE Workshop on Computer Security Foundations
, pp. 82-96
-
-
Blanchet, B.1
-
8
-
-
33751067991
-
A computationally sound mechanized prover for security protocols
-
May 21-24, Oakland, California
-
Blanchet, B., 2006. A computationally sound mechanized prover for security protocols. Proceedings of IEEE Symposium on Security and Privacy, May 21-24, Oakland, California, pp: 150-154.
-
(2006)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 150-154
-
-
Blanchet, B.1
-
9
-
-
55949087657
-
A computationally sound mechanized prover for security protocols
-
Blanchet, B., 2007a. A computationally sound mechanized prover for security protocols. IEEE Trans. Dependable Secure Comput., 5: 193-207.
-
(2007)
IEEE Trans. Dependable Secure Comput.
, vol.5
, pp. 193-207
-
-
Blanchet, B.1
-
10
-
-
35048865382
-
Computationally sound mechanized proofs of correspondence assertions
-
July 6-8, Venice, Italy
-
Blanchet, B., 2007b. Computationally sound mechanized proofs of correspondence assertions. Proceedings of 20th IEEE Computer Security Foundations Symposium, July 6-8, Venice, Italy, pp: 97-111.
-
(2007)
Proceedings of 20th IEEE Computer Security Foundations Symposium
, pp. 97-111
-
-
Blanchet, B.1
-
11
-
-
70350687722
-
Computationally sound mechanized proofs for basic and public-key Kerberos
-
March 2008, Tokyo, Japan
-
Blanchet B., A.D. Jaggard, A. Scedrov and J. Tsay, 2008. Computationally sound mechanized proofs for basic and public-key kerberos. Proceedings of the ACM Symposium on Information, Computer and Communications Security, March 2008, Tokyo, Japan, pp: 87-99.
-
(2008)
Proceedings of the ACM Symposium on Information, Computer and Communications Security
, pp. 87-99
-
-
Blanchet, B.1
Jaggard, A.D.2
Scedrov, A.3
Tsay, J.4
-
12
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
May 06, Springer-Verlag, London, UK
-
Canetti, R. and H. Krawczyk, 2001. Analysis of key-exchange protocols and their use for building secure channels. Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology, May 06, Springer-Verlag, London, UK., pp: 453-474.
-
(2001)
Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
13
-
-
84947232363
-
Universally composable notions of key exchange and secure channels
-
Canetti, R. and H. Krawczyk, 2002. Universally composable notions of key exchange and secure channels. Adv. Cryptol., 2332: 337-351.
-
(2002)
Adv. Cryptol.
, vol.2332
, pp. 337-351
-
-
Canetti, R.1
Krawczyk, H.2
-
15
-
-
0031632567
-
Concurrent zero-knowledge
-
1998, USA
-
Dwork, C, M. Naor and A. Sahai, 1998. Concurrent zero-knowledge. Proceedings of the 30th Annual ACM Symposium on Theory of Computing, 1998, USA., pp: 409-418.
-
(1998)
Proceedings of the 30th Annual ACM Symposium on Theory of Computing
, pp. 409-418
-
-
Dwork, C.1
Naor, M.2
Sahai, A.3
-
16
-
-
0037019232
-
Deniable authentication protocol based on Diffie-Hellman algorithm
-
Fan, L., C.X. Xu and J.H. Li, 2002. Deniable authentication protocol based on Diffie-Hellman algorithm. Elect. Lett., 38: 705-706.
-
(2002)
Elect. Lett.
, vol.38
, pp. 705-706
-
-
Fan, L.1
Xu, C.X.2
Li, J.H.3
-
17
-
-
37349038164
-
Universally composable security concurrent deniable authentication based on witness indistinguishable
-
Feng, T. and J.F. Ma, 2007. Universally composable security concurrent deniable authentication based on witness indistinguishable. J. Software, 18: 2871-2881.
-
(2007)
J. Software
, vol.18
, pp. 2871-2881
-
-
Feng, T.1
Ma, J.F.2
-
18
-
-
78651377249
-
Deniable Authentication protocol resisting man-in-the-middle attack
-
Han, S., W.Q. Liu and E. Chang, 2005. Deniable Authentication protocol resisting man-in-the-middle attack. Proc. World Acad. Sci. Eng. Technol., 3: 161-164.
-
(2005)
Proc. World Acad. Sci. Eng. Technol.
, vol.3
, pp. 161-164
-
-
Han, S.1
Liu, W.Q.2
Chang, E.3
-
20
-
-
33745787443
-
Secrecy types for a simulatable cryptographic library
-
Nov. 07-11, ACM, New York
-
Laud, P., 2005. Secrecy types for a simulatable cryptographic library. Proceedings of the 12th ACM Conference on Computer and Communications Security, Nov. 07-11, ACM, New York, pp: 26-35.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security
, pp. 26-35
-
-
Laud, P.1
-
21
-
-
33845950814
-
A novel deniable authentication protocol using generalized ElGamal signature scheme
-
Lee, W.B., C.C. Wu and W.J. Tsaur, 2007. A novel deniable authentication protocol using generalized ElGamal signature scheme. Inform. Sci., 177: 1376-1381.
-
(2007)
Inform. Sci.
, vol.177
, pp. 1376-1381
-
-
Lee, W.B.1
Wu, C.C.2
Tsaur, W.J.3
-
22
-
-
0032218226
-
A probabilistic poly-time framework for protocol analysis
-
Nov. 02-05, San Francisco, California, United States
-
Lincoln, P., J. Mitchell, M. Mitchell and A. Scedrov, 1998. A probabilistic poly-time framework for protocol analysis. Proceedings of the 5th ACM Conference on Computer and Communications Security, Nov. 02-05, San Francisco, California, United States, pp: 112-121.
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communications Security
, pp. 112-121
-
-
Lincoln, P.1
Mitchell, J.2
Mitchell, M.3
Scedrov, A.4
-
23
-
-
78651353943
-
Probabilistic polynomial-time equivalence and security analysis
-
Lincoln, P., J.C. Mitchell, M. Mitchell and A. Scedrov, 1999. Probabilistic polynomial-time equivalence and security analysis. Proc. World Cong. Formal Meth. Dev. Comput. Syst., 1: 776-793.
-
(1999)
Proc. World Cong. Formal Meth. Dev. Comput. Syst.
, vol.1
, pp. 776-793
-
-
Lincoln, P.1
Mitchell, J.C.2
Mitchell, M.3
Scedrov, A.4
-
24
-
-
26044448602
-
A new deniable authentication protocol from bilinear pairings
-
DOI 10.1016/j.amc.2004.09.030, PII S0096300304006538
-
Lu, R. and Z. Cao, 2005a. A new deniable authentication protocol from bilinear pairings. Applied Math. Comput., 168: 954-961. (Pubitemid 41405653)
-
(2005)
Applied Mathematics and Computation
, vol.168
, Issue.2
, pp. 954-961
-
-
Lu, R.1
Cao, Z.2
-
25
-
-
14844309431
-
Non-interactive deniable authentication protocol based on factoring
-
DOI 10.1016/j.csi.2004.09.007, PII S0920548904001096, Mobile Commerce: A New Frontier in e-Commerce and Wireless Communication
-
Lu, R. and Z. Cao, 2005b. Non-interactive deniable authentication protocol based on factoring. Comput. Standards Interfaces, 27: 401-405. (Pubitemid 40339687)
-
(2005)
Computer Standards and Interfaces
, vol.27
, Issue.4
, pp. 401-405
-
-
Lu, R.1
Cao, Z.2
-
26
-
-
62749124406
-
A secure non-interactive deniable authentication protocol with strong deniability based on discrete logarithm problem and its application on Internet voting protocol
-
Meng, B., 2009a. A secure non-interactive deniable authentication protocol with strong deniability based on discrete logarithm problem and its application on Internet voting protocol. Inform. Technol. J., 8: 302-309.
-
(2009)
Inform. Technol. J.
, vol.8
, pp. 302-309
-
-
Meng, B.1
-
27
-
-
67651065167
-
Formalizing deniability
-
Meng, B., 2009b. Formalizing deniability. Inform. Technol. J., 8: 625-642.
-
(2009)
Inform. Technol. J.
, vol.8
, pp. 625-642
-
-
Meng, B.1
-
28
-
-
35048899313
-
Soundness of formal encryption in the presence of active adversaries
-
Micciancio, D. and B. Warinschi, 2004. Soundness of formal encryption in the presence of active adversaries. Theory Cryptography (LNCS), 2951: 133-151.
-
(2004)
Theory Cryptography (LNCS)
, vol.2951
, pp. 133-151
-
-
Micciancio, D.1
Warinschi, B.2
-
29
-
-
33746912795
-
Efficient non-interactive deniable authentication protocols
-
Sept. 21-23, IEEE Computer Society Washington, DC. USA
-
Qian, H.F., Z.F. Cao, L.C. Wang and Q.S. Xue, 2005. Efficient non-interactive deniable authentication protocols. Proceedings of the 5th International Conference on Computer and Information Technology, Sept. 21-23, IEEE Computer Society Washington, DC. USA., pp: 673-679.
-
(2005)
Proceedings of the 5th International Conference on Computer and Information Technology
, pp. 673-679
-
-
Qian, H.F.1
Cao, Z.F.2
Wang, L.C.3
Xue, Q.S.4
-
30
-
-
33745767675
-
New approaches for deniable authentication
-
Nov. 7-11, ACM Press, New York
-
Raimondo, M.D. and R. Gennaro, 2005. New approaches for deniable authentication. Proceedings of the 12th ACM Conference on Computer and Communications Security, Nov. 7-11, ACM Press, New York, pp: 112-121.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security
, pp. 112-121
-
-
Raimondo, M.D.1
Gennaro, R.2
-
31
-
-
2342455866
-
Efficient deniable authentication protocol based on generalized ElGamal signature scheme
-
Shao, Z., 2004. Efficient deniable authentication protocol based on generalized ElGamal signature scheme. Comput. Standards Interfaces, 26: 449-454.
-
(2004)
Comput. Standards Interfaces
, vol.26
, pp. 449-454
-
-
Shao, Z.1
-
32
-
-
15544375802
-
Identity-based deniable authentication protocol
-
Shi, Y. and J. Li, 2005. Identity-based deniable authentication protocol. Elect. Lett., 41: 241-242.
-
(2005)
Elect. Lett.
, vol.41
, pp. 241-242
-
-
Shi, Y.1
Li, J.2
|