The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Dolev-Yao-style (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2004 (6) 2005 (8) 2006 (3) 2007 (2) 2008 (4)
Publication types (Num. hits)
article(7) inproceedings(16)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 19 occurrences of 14 keywords

Results
Found 23 publication records. Showing 23 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
152Michael Backes 0001, Birgit Pfitzmann, Michael Waidner Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Dolev-Yao, Symmetric authentication, Computational soundness
133Michael Backes 0001, Markus Dürmuth A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
121Michael Backes 0001, Dominique Unruh Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers. Search on Bibsonomy CSF The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Formal methods, zero-knowledge proofs, computational soundness
113Michael Backes 0001, Birgit Pfitzmann Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Dolev-Yao-style, Reactive simulatability/UC, Limitations, XOR, Computational soundness
106Ran Canetti, Jonathan Herzog Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
105Michael Backes 0001, Birgit Pfitzmann Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
98Michael Backes 0001, Thomas Groß 0001 Tailoring the Dolev-Yao abstraction to web services realities. Search on Bibsonomy SWS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Dolev Yao, security proof of protocols, formal method, tool support, security analysis, web services security, federated identity management, protocol model
74Michael Backes 0001, Birgit Pfitzmann, Michael Waidner Low-Level Ideal Signatures and General Integrity Idealization. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
54Michael Backes 0001, Birgit Pfitzmann, Andre Scedrov Key-dependent message security under active attacks - BRSIM/UC-soundness of Dolev-Yao-style encryption with key cycles. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
54Michael Backes 0001, Birgit Pfitzmann Limits of the Cryptographic Realization of Dolev-Yao-style XOR. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
54Michael Backes 0001, Birgit Pfitzmann Limits of the Cryptographic Realization of Dolev-Yao-Style XOR. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
54Michael Backes 0001, Birgit Pfitzmann Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2004 DBLP  BibTeX  RDF
54Michael Backes 0001 A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
51Michael Backes 0001, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Christoph Sprenger 0001, David A. Basin Cryptographically-Sound Protocol-Model Abstractions. Search on Bibsonomy CSF The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptographic soundness, formal methods, theorem proving, Cryptographic protocols, simulatability
27Véronique Cortier, Stéphanie Delaune, Graham Steel A Formal Theory of Key Conjuring. Search on Bibsonomy CSF The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Jeffrey A. Vaughan, Steve Zdancewic A Cryptographic Decentralized Label Model. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Daniele Micciancio, Saurabh Panjwani Corrupting One vs. Corrupting Many: The Case of Broadcast and Multicast Encryption. Search on Bibsonomy ICALP (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Michael Backes 0001, Birgit Pfitzmann Relating Symbolic and Cryptographic Secrecy. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Relations between models, probabilistic computation—cryptography, Dolev-Yao model, secrecy, simulatability
27Detlef Kähler, Ralf Küsters Constraint Solving for Contract-Signing Protocols. Search on Bibsonomy CONCUR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Michael Backes 0001, Birgit Pfitzmann Relating Symbolic and Cryptographic Secrecy. Search on Bibsonomy S&P The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Michael Backes 0001, Birgit Pfitzmann A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Paul Hankes Drielsma, Sebastian Mödersheim, Luca Viganò 0001 A Formalization of Off-Line Guessing for Security Protocol Analysis. Search on Bibsonomy LPAR The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #23 of 23 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license