-
1
-
-
0001772130
-
Secrecy by Typing in Security Protocols
-
September
-
Martín Abadi. Secrecy by Typing in Security Protocols. Journal of the ACM, 46(5):749-786, September 1999.
-
(1999)
Journal of the ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
84978977131
-
Formal Eavesdropping and Its Computational Interpretation
-
Naoki Kobayashi and Benjamin C. Pierce, editors, Theoretical Aspects of Computer Software, 4th International Symposium, TACS 2001, Sendai, Japan, October Springer-Verlag
-
Martín Abadi and Jan Jürjens. Formal Eavesdropping and Its Computational Interpretation. In Naoki Kobayashi and Benjamin C. Pierce, editors, Theoretical Aspects of Computer Software, 4th International Symposium, TACS 2001, volume 2215 of LNCS, pages 82-94, Sendai, Japan, October 2001. Springer-Verlag.
-
(2001)
LNCS
, vol.2215
, pp. 82-94
-
-
Abadi, M.1
Jürjens, J.2
-
3
-
-
84879078812
-
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)
-
Jan van Leeuwen, Osamu Watanabe, Masami Hagiya, Peter D. Mosses, and Takayasu Ito, editors, International Conference IFIP TCS 2000, Sendai, Japan, August. Springer-Verlag
-
Martín Abadi and Phillip Rogaway. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). In Jan van Leeuwen, Osamu Watanabe, Masami Hagiya, Peter D. Mosses, and Takayasu Ito, editors, International Conference IFIP TCS 2000, volume 1872 of LNCS, pages 3-22, Sendai, Japan, August 2000. Springer-Verlag.
-
(2000)
LNCS
, vol.1872
, pp. 3-22
-
-
Abadi, M.1
Rogaway, P.2
-
4
-
-
33646045378
-
Soundness of formal encryption in the presence of key-cycles
-
Sabrina De Capitani di Vimercati, Paul F. Syverson, and Dieter Gollmann, editors, ESORICS, Springer
-
Pedro Adão, Gergei Bana, Jonathan Herzog, and Andre Scedrov. Soundness of formal encryption in the presence of key-cycles. In Sabrina De Capitani di Vimercati, Paul F. Syverson, and Dieter Gollmann, editors, ESORICS, volume 3679 of Lecture Notes in Computer Science, pages 374-396. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3679
, pp. 374-396
-
-
Adão, P.1
Bana, G.2
Herzog, J.3
Scedrov, A.4
-
5
-
-
0033702592
-
Transforming out timing leaks
-
Boston, Massachusetts, January ACM Press
-
Johan Agat. Transforming out timing leaks. In POPL 2000, Proceedings of the 27th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 40-53, Boston, Massachusetts, January 2000. ACM Press.
-
(2000)
POPL 2000, Proceedings of the 27th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 40-53
-
-
Agat, J.1
-
7
-
-
33749846305
-
Cryptographically-Masked flows
-
Kwangkeun Yi, editor, SAS, Springer
-
Aslan Askarov, Daniel Hedin, and Andrei Sabelfeld. Cryptographically- Masked flows. In Kwangkeun Yi, editor, SAS, volume 4134 of Lecture Notes in Computer Science, pages 353-369. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4134
, pp. 353-369
-
-
Askarov, A.1
Hedin, D.2
Sabelfeld, A.3
-
8
-
-
32844458560
-
A Universally Composable Cryptographic Library
-
ACM Press. Extended version available as Report 2003/015 of Cryptology ePrint Archive
-
Michael Backes, Birgit Pfitzmann, and Michael Waidner. A Universally Composable Cryptographic Library. In Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington, DC, October 2003. ACM Press. Extended version available as Report 2003/015 of Cryptology ePrint Archive.
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington, DC, October 2003
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
9
-
-
84937407719
-
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
-
Tatsuaki Okamoto, editor, Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December SpringerVerlag
-
Mihir Bellare and Chanathip Namprempre. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. In Tatsuaki Okamoto, editor, Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, volume 1976 of LNCS, pages 531-545, Kyoto, Japan, December 2000. Springer-Verlag.
-
(2000)
LNCS
, vol.1976
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
10
-
-
0027726717
-
Random Oracles are Practical: A Paradigm for Designing Efficient Protocols
-
Fairfax, Virginia, November ACM Press
-
Mihir Bellare and Phillip Rogaway. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In CCS '93, Proceedings of the 1st ACM Conference on Computer and Communications Security, pages 62-73, Fairfax, Virginia, November 1993. ACM Press.
-
(1993)
CCS '93, Proceedings of the 1st ACM Conference on Computer and Communications Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
11
-
-
0031351741
-
A Concrete Security Treatment of Symmetric Encryption
-
Miami Beach, Florida, October IEEE Computer Society Press
-
Mihir Bellare, Anand Desai, Eron Jokipii, and Phillip Rogaway. A Concrete Security Treatment of Symmetric Encryption. In 38th Annual Symposium on Foundations of Computer Science, pages 394-403, Miami Beach, Florida, October 1997. IEEE Computer Society Press.
-
(1997)
38th Annual Symposium on Foundations of Computer Science
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
12
-
-
35248822352
-
Encryption-scheme security in the presence of key-dependent messages
-
Kaisa Nyberg and Howard M. Heys, editors, Selected Areas in Cryptography, Springer
-
John Black, Phillip Rogaway, and Thomas Shrimpton. Encryption-scheme security in the presence of key-dependent messages. In Kaisa Nyberg and Howard M. Heys, editors, Selected Areas in Cryptography, volume 2595 of Lecture Notes in Computer Science, pages 62-75. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2595
, pp. 62-75
-
-
Black, J.1
Rogaway, P.2
Shrimpton, T.3
-
13
-
-
84937553676
-
Static analysis for secrecy and non-interference in networks of processes
-
Victor E. Malyshkin, editor, PaCT, Springer
-
Chiara Bodei, Pierpaolo Degano, Flemming Nielson, and Hanne Riis Nielson. Static analysis for secrecy and non-interference in networks of processes. In Victor E. Malyshkin, editor, PaCT, volume 2127 of Lecture Notes in Computer Science, pages 27-41. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2127
, pp. 27-41
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Nielson, H.R.4
-
14
-
-
24644437051
-
Computationally Sound, Automated Proofs for Security Protocols
-
Shmuel Sagiv, editor, Programming Languages and Systems, 14th European Symposium on Programming, ESOP 2005, Edinburgh, UK, April Springer-Verlag
-
Veronique Cortier and Bogdan Warinschi. Computationally Sound, Automated Proofs for Security Protocols. In Shmuel Sagiv, editor, Programming Languages and Systems, 14th European Symposium on Programming, ESOP 2005, volume 3444 of LNCS, pages 157-171, Edinburgh, UK, April 2005. Springer-Verlag.
-
(2005)
LNCS
, vol.3444
, pp. 157-171
-
-
Cortier, V.1
Warinschi, B.2
-
15
-
-
0020720357
-
On the security of public key protocols
-
March
-
Danny Dolev and Andrew C. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29(12):198-208, March 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.IT-29
, Issue.12
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
16
-
-
67650106120
-
Cryptographically Sound Implementations for Typed Information-Flow Security
-
ACM Press
-
Cédric Fournet and Tamara Rezk. Cryptographically Sound Implementations for Typed Information-Flow Security. In POPL 2008, Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, San Francisco, California, January 2008. ACM Press.
-
POPL 2008, Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, San Francisco, California, January 2008
-
-
Fournet, C.1
Rezk, T.2
-
18
-
-
35048817402
-
Basic Tools
-
Cambridge University Press
-
Oded Goldreich. Foundations of Cryptography. Volume 1 - Basic Tools. Cambridge University Press, 2001.
-
(2001)
Foundations of Cryptography
, vol.1
-
-
Goldreich, O.1
-
20
-
-
84945249768
-
Semantics and Program Analysis of Computationally Secure Information Flow
-
David Sands, editor, Programming Languages and Systems, 10th European Symposium on Programming, ESOP 2001, Genova, Italy, April Springer-Verlag
-
Peeter Laud. Semantics and Program Analysis of Computationally Secure Information Flow. In David Sands, editor, Programming Languages and Systems, 10th European Symposium on Programming, ESOP 2001, volume 2028 of LNCS, pages 77-91, Genova, Italy, April 2001. Springer-Verlag.
-
(2001)
LNCS
, vol.2028
, pp. 77-91
-
-
Laud, P.1
-
21
-
-
35248840989
-
Handling Encryption in Analyses for Secure Information Flow
-
Pierpaolo Degano, editor, Programming Languages and Systems, 12th European Symposium on Programming, ESOP 2003, Warsaw, Poland, April Springer-Verlag
-
Peeter Laud. Handling Encryption in Analyses for Secure Information Flow. In Pierpaolo Degano, editor, Programming Languages and Systems, 12th European Symposium on Programming, ESOP 2003, volume 2618 of LNCS, pages 159-173, Warsaw, Poland, April 2003. Springer-Verlag.
-
(2003)
LNCS
, vol.2618
, pp. 159-173
-
-
Laud, P.1
-
22
-
-
26844509701
-
A Type System for Computationally Secure Information Flow
-
Maciej Liśkiewicz and Rüdiger Reischuk, editors, 15th International Symposium on Fundamentals of Computation Theory (FCT) 2005, Lübeck, Germany, August Springer-Verlag
-
Peeter Laud and Varmo Vene. A Type System for Computationally Secure Information Flow. In Maciej Liśkiewicz and Rüdiger Reischuk, editors, 15th International Symposium on Fundamentals of Computation Theory (FCT) 2005, volume 3623 of LNCS, pages 365-377, Lübeck, Germany, August 2005. Springer-Verlag.
-
(2005)
LNCS
, vol.3623
, pp. 365-377
-
-
Laud, P.1
Vene, V.2
-
24
-
-
0032646625
-
JFlow: Practical Mostly-Static Information Flow Control
-
San Antonio, Texas, January ACM Press
-
Andrew C. Myers. JFlow: Practical Mostly-Static Information Flow Control. In POPL '99, Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 228-241, San Antonio, Texas, January 1999. ACM Press.
-
(1999)
POPL '99, Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 228-241
-
-
Myers, A.C.1
-
26
-
-
84865644032
-
-
IEEE Computer Society
-
Birgit Pfitzmann and Patrick McDaniel, editors. 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, 2007. IEEE Computer Society.
-
(2007)
2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA
-
-
Pfitzmann, B.1
McDaniel, P.2
-
28
-
-
84957869855
-
A Per Model of Secure Information Flow in Sequential Programs
-
S. Doaitse Swierstra, editor, Programming Languages and Systems, 8th European Symposium on Programming, ESOP'99, Amsterdam, The Netherlands, March Springer-Verlag
-
Andrei Sabelfeld and David Sands. A Per Model of Secure Information Flow in Sequential Programs. In S. Doaitse Swierstra, editor, Programming Languages and Systems, 8th European Symposium on Programming, ESOP'99, volume 1576 of LNCS, pages 40-58, Amsterdam, The Netherlands, March 1999. Springer-Verlag.
-
(1999)
LNCS
, vol.1576
, pp. 40-58
-
-
Sabelfeld, A.1
Sands, D.2
-
29
-
-
28144453799
-
Dimensions and principles of declassification
-
IEEE Computer Society
-
Andrei Sabelfeld and David Sands. Dimensions and principles of declassification. In CSFW, pages 255-269. IEEE Computer Society, 2005.
-
(2005)
CSFW
, pp. 255-269
-
-
Sabelfeld, A.1
Sands, D.2
-
31
-
-
0031648455
-
Secure Information Flow in a Multi-threaded Imperative Language
-
San Diego, California, January ACM Press
-
Geoffrey Smith and Dennis M. Volpano. Secure Information Flow in a Multi-threaded Imperative Language. In POPL '98, Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 355-364, San Diego, California, January 1998. ACM Press.
-
(1998)
POPL '98, Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 355-364
-
-
Smith, G.1
Volpano, D.M.2
|