-
2
-
-
0030646696
-
Optimistic protocols for fair exchange
-
In T. Matsumoto, editor, Zurich, Switzerland, Apr, ACM Press
-
N. Asokan, M. Schunter, and M. Waidner. Optimistic protocols for fair exchange. In T. Matsumoto, editor, 4th ACM Conference on Computer and Communications Security, pages 6, 8–17, Zurich, Switzerland, Apr. 1997. ACM Press.
-
(1997)
4Th ACM Conference on Computer and Communications Security
, vol.6
, pp. 8-17
-
-
Asokan, N.1
Schunter, M.2
Waidner, M.3
-
3
-
-
0031650188
-
Asynchronous protocols for optimistic fair exchange
-
Oakland, CA, May 1998. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press
-
N. Asokan, V. Shoup, and M. Waidner. Asynchronous protocols for optimistic fair exchange. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 86–99, Oakland, CA, May 1998. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press.
-
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 86-99
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
5
-
-
84944055170
-
-
volume 426, number 1871, 1989. In William Stallings, Practical Cryptography for Data Internetworks, IEEE Computer Society Press
-
M. Burrows, M. Abadi, and R. Needham. A logic of authentication, from proceedings of the royal society, volume 426, number 1871, 1989. In William Stallings, Practical Cryptography for Data Internetworks, IEEE Computer Society Press, 1996. 1996.
-
(1996)
A Logic of Authentication, from Proceedings of the Royal Society
, vol.1996
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
6
-
-
84906087402
-
Abstract interpretation of game properties
-
Springer-Verlag
-
T. Henzinger, R. Manjumdar, F. Mang, and J.-F. Raskin. Abstract interpretation of game properties. In SAS 2000: Intertional Symposium on Static Analysis, Lecture Notes in Computer Science. Springer-Verlag, 2000.
-
(2000)
SAS 2000: Intertional Symposium on Static Analysis, Lecture Notes in Computer Science
-
-
Henzinger, T.1
Manjumdar, R.2
Mang, F.3
Raskin, J.-F.4
-
7
-
-
0010569409
-
Optimistic non-repudiable information exchange
-
In J. Biemond, editor, Werkgemeenschap Informatie- en Communicatietheorie, Enschede, may
-
S. Kremer and O. Markowitch. Optimistic non-repudiable information exchange. In J. Biemond, editor, 21th Symp. on Information Theory in the Benelux, pages 139–146. Werkgemeenschap Informatie- en Communicatietheorie, Enschede, may 2000.
-
(2000)
21Th Symp. On Information Theory in the Benelux
, pp. 139-146
-
-
Kremer, S.1
Markowitch, O.2
-
9
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Lecture Notes in Computer Science, 1055:147–157, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1055
, pp. 147-157
-
-
Lowe, G.1
-
10
-
-
84959047912
-
A multi-party optimistic non-repudiation protocol
-
In D.Won, editor, Seoul, Korea, Springer-Verlag
-
O. Markowitchand S. Kremer. A multi-party optimistic non-repudiation protocol. In D.Won, editor, Proceedings of The 3rd International Conference on Information Security and Cryptology (ICISC 2000), volume 2015 of Lecture Notes in Computer Science, Seoul, Korea, 2000. Springer-Verlag.
-
(2000)
Proceedings of the 3Rd International Conference on Information Security and Cryptology (ICISC 2000), Volume 2015 of Lecture Notes in Computer Science
-
-
Markowitchand, O.1
Kremer, S.2
-
11
-
-
84949740740
-
Analyzing the Needham-Schroeder public-key protocol: A comparison of two approaches
-
C. A. Meadows. Analyzing the Needham-Schroeder public-key protocol: A comparison of two approaches. Lecture Notes in Computer Science, 1146:351–365, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1146
, pp. 351-365
-
-
Meadows, C.A.1
-
12
-
-
0030705795
-
Proving properties of security protocols by induction
-
IEEE Computer Society Press, June
-
L. C. Paulson. Proving properties of security protocols by induction. In Proceedings of the 10th Computer Security Foundations Workshop, pages 70–83. IEEE Computer Society Press, June 1997.
-
(1997)
Proceedings of the 10Th Computer Security Foundations Workshop
, pp. 70-83
-
-
Paulson, L.C.1
|