The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase cryptographic protocols (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1981-1988 (15) 1989-1991 (16) 1992-1994 (27) 1995-1996 (22) 1997 (23) 1998 (15) 1999 (23) 2000 (38) 2001 (34) 2002 (44) 2003 (57) 2004 (67) 2005 (87) 2006 (73) 2007 (77) 2008 (85) 2009 (55) 2010 (31) 2011 (22) 2012-2013 (22) 2014 (15) 2015 (19) 2016 (17) 2017 (15) 2018 (15) 2019 (1)
Publication types (Num. hits)
article(205) book(1) incollection(6) inproceedings(661) phdthesis(42)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 851 occurrences of 397 keywords

Results
Found 915 publication records. Showing 915 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
69Dongyao Ji, Yuming Wang Comments on "An approach to the formal verification of the two-party cryptographic protocols" by Zhang, Li and Xiao. Search on Bibsonomy Operating Systems Review The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
68David Sinclair, David Gray, Geoff W. Hamilton Synthesising Attacks on Cryptographic Protocols. Search on Bibsonomy ATVA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, model checking, cryptographic protocols
60Michael Backes 0001, Birgit Pfitzmann Relating Symbolic and Cryptographic Secrecy. Search on Bibsonomy IEEE Trans. Dependable Sec. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Relations between models, probabilistic computation—cryptography, Dolev-Yao model, secrecy, simulatability
60Michael Backes 0001, Birgit Pfitzmann Relating Symbolic and Cryptographic Secrecy. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
59Mabroka Ali Mayouf, Zarina Shukur Using Animation in Active Learning Tool to Detect Possible Attacks in Cryptographic Protocols. Search on Bibsonomy IVIC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF possible attacks, animation, active learning, cryptographic protocols, visual metaphor
59Alaaeddine Fellah, John Mullins Admissible Interference by Typing for Cryptographic Protocols. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Admissible interference, Type systems, Process Algebra, Cryptographic Protocols, Security Properties
57Angelos D. Keromytis, Jason L. Wright, Theo de Raadt, Matthew Burnside Cryptography as an operating system service: A case study. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authentication, digital signatures, Encryption, hash functions, cryptographic protocols
57Véronique Cortier, Michaël Rusinowitch, Eugen Zalinescu A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures. Search on Bibsonomy PPDP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF resolution strategies, verification, cryptographic protocols, horn clauses
56Donald Beaver, Stuart Haber Cryptographic Protocols Provably Secure Against Dynamic Adversaries. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
55Ralf Küsters On the decidability of cryptographic protocols with open-ended data structures. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Complexity, Cryptographic protocols, Decidability, Transducers
54Helmut Seidl, Kumar Neeraj Verma Flat and one-variable clauses: Complexity of verifying cryptographic protocols with single blind copying. Search on Bibsonomy ACM Trans. Comput. Log. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF instantiation-based theorem proving, Cryptographic protocols, first-order logic, resolution, Horn clauses
54Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. Guttman, John D. Ramsdell Compiling cryptographic protocols for deployment on the web. Search on Bibsonomy WWW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF CPPL, cryptographic protocols, HTTP, sessions
53Michael Backes 0001, Birgit Pfitzmann, Michael Waidner Justifying a Dolev-Yao Model Under Active Attacks. Search on Bibsonomy FOSAD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
52Randall W. Lichota, Grace L. Hammonds, Stephen H. Brackin Verifying The Correctness Of Cryptographic Protocols Using "Convince". Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Convince, theorem proving component, commercial computer aided software engineering tool, StP/OMT, textual notations, Higher Order Logic theorem prover, protocols, cryptographic protocols, authentication protocols, front-end, belief logic, correctness verification, automated support
51Roberto M. Amadio, Denis Lugiez On the Reachability Problem in Cryptographic Protocols. Search on Bibsonomy CONCUR The full citation details ... 2000 DBLP  DOI  BibTeX  RDF verification, cryptographic protocols, symbolic computation
51Xianxian Li, Jinpeng Huai Cryptographic protocol security analysis based on bounded constructing algorithm. Search on Bibsonomy Science in China Series F: Information Sciences The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptographic protocol, formal analysis, security verification
51Alfred P. Maneki Honest Functions and their Application to the Analysis of Cryptographic Protocols. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
48Ran Canetti, Jonathan Herzog Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
48Nazim Benassa Modelling Attacker's Knowledge for Cascade Cryptographic Protocols. Search on Bibsonomy ABZ The full citation details ... 2008 DBLP  DOI  BibTeX  RDF model for attacker, formal methods, cryptography
47Volker Roth 0002 On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection. Search on Bibsonomy Mobile Agents The full citation details ... 2001 DBLP  DOI  BibTeX  RDF breaking security protocols, cryptanalysis, mobile agent security
46Stephen H. Brackin A HOL extension of GNY for automatically analyzing cryptographic protocols. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF HOL extension, automatically analyzing cryptographic protocols, higher order logic theory, authentication properties, protocol properties, hash operations, key-exchange algorithms, formal specification, cryptography, message authentication, access protocols, message authentication codes, multiple encryption, belief maintenance, belief logic
44Ralf Küsters, Thomas Wilke Automata-Based Analysis of Recursive Cryptographic Protocols. Search on Bibsonomy STACS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
44Jay A. McCarthy, Shriram Krishnamurthi Minimal backups of cryptographic protocol runs. Search on Bibsonomy FMSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cppl, cryptographic protocols, coq, strand spaces
44Jan Jürjens, Mark Yampolskiy Code security analysis with assertions. Search on Bibsonomy ASE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF code security analysis, cryto-based software, cryptographic protocols, first-order logic, assertions, automated theorem proving, C programs
44Sherman S. M. Chow Verifiable Pairing and Its Applications. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF verifiable pairing, threshold decryption, cryptographic protocols, Bilinear pairing, signcryption, undeniable signature, ID-based cryptography, cryptographic primitives, ID-based signature, exact security
43Detlef Kähler, Ralf Küsters, Tomasz Truderung Infinite State AMC-Model Checking for Cryptographic Protocols. Search on Bibsonomy LICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
43Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano Efficient representation of the attacker's knowledge in cryptographic protocols analysis. Search on Bibsonomy Formal Asp. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Knowledge representation, Cryptographic protocols, State space exploration
43Zhiyao Liang, Rakesh M. Verma Complexity of Checking Freshness of Cryptographic Protocols. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Athena, NP-completeness, Cryptographic protocols, undecidability, replay attack, model checker, freshness, challenge response
43Martín Abadi, Roger M. Needham Prudent Engineering Practice for Cryptographic Protocols. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF security, authentication, Cryptography, cryptographic protocols, authentication protocols
43James W. Gray III, John McLean Using temporal logic to specify and verify cryptographic protocols. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF specify, system penetrator, correctness requirements, verification, formal specification, formal methods, cryptography, protocols, formal verification, temporal logic, temporal logic, cryptographic protocols, verify
43Mohamed Mejri Chaotic Protocols. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
43Andy Gordon Authenticity Types for Cryptographic Protocols. Search on Bibsonomy FASec The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
42Ran Canetti Security and composition of cryptographic protocols: a tutorial (part I). Search on Bibsonomy SIGACT News The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Ran Canetti, Hugo Krawczyk Universally Composable Notions of Key Exchange and Secure Channels. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Composition of protocols, Cryptographic Protocols, Key Exchange, Proofs of Security
42Taekyoung Kwon 0002, JooSeok Song Security and efficiency in authentication protocols resistant to password guessing attack. Search on Bibsonomy LCN The full citation details ... 1997 DBLP  DOI  BibTeX  RDF password guessing attack resistance, secret, user-chosen weak secret, security-oriented protocols, cipher operations, protocol steps, poorly-chosen weak secret protection, security, efficiency, cryptographic protocols, key exchange, message authentication, authentication protocols, secure communications, random numbers, dictionary attacks
41Yongdae Kim, Adrian Perrig, Gene Tsudik Group Key Agreement Efficient in Communication. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Security, group communication, cryptographic protocols, communication complexity, group key agreement
41Mourad Debbabi, Nancy A. Durgin, Mohamed Mejri, John C. Mitchell Security by typing. Search on Bibsonomy STTT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Intruder abilities, Authentication, Integrity, Type System, Cryptographic Protocols, Secrecy
41Roberto M. Amadio, Sanjiva Prasad The Game of the Name in Cryptographic Tables. Search on Bibsonomy ASIAN The full citation details ... 1999 DBLP  DOI  BibTeX  RDF $pi$-calculus, verification, cryptographic protocols
41Xiaochun Cheng, Xiaoqi Ma, Maggie Xiaoyan Cheng, Scott C.-H. Huang Proving secure properties of cryptographic protocols with knowledge based approach. Search on Bibsonomy IPCCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
40Aggelos Kiayias, Moti Yung Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination. Search on Bibsonomy Financial Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40Patroklos G. Argyroudis, Raja Verma, Hitesh Tewari, Donal O'Mahony Performance Analysis of Cryptographic Protocols on Handheld Devices. Search on Bibsonomy NCA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
40R. K. Shyamasundar Analyzing Cryptographic Protocols in a Reactive Framework. Search on Bibsonomy VMCAI The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
39Dennis Hofheinz, Jörn Müller-Quade, Rainer Steinwandt Initiator-Resilient Universally Composable Key Exchange. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF formal cryptography, universalcomposition, cryptographic protocols, key exchange
39Chih-Hung Li, Josef Pieprzyk Conference Key Agreement from Secret Sharing. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Key Establishment Protocols, Shamir Secret Sharing, Cryptographic Protocols, Key Agreement Protocols
38Huawei Zhao, Jing Qin 0002, Zhifeng Fang Converters for Designing Applied Cryptographic Protocols. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
38Karthikeyan Bhargavan, Cédric Fournet, Ricardo Corin, Eugen Zalinescu Cryptographically verified implementations for TLS. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF verified implementations, authentication, cryptographic protocols, SSL, TLS, secrecy
37Yuqing Zhang, Xiuying Liu An approach to the formal verification of the three-principal cryptographic protocols. Search on Bibsonomy Operating Systems Review The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36Jordi Castellà-Roca, Josep Domingo-Ferrer, Francesc Sebé A Smart Card-Based Mental Poker System. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Smart cards and applications in the Internet, Cryptographic protocols for smart cards, E-gambling, Mental poker
36Giuseppe Ateniese, Breno de Medeiros Efficient Group Signatures without Trapdoors. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF privacy and anonymity, cryptographic protocols, Group signatures
36Roberto M. Amadio, Witold Charatonik On Name Generation and Set-Based Analysis in the Dolev-Yao Model. Search on Bibsonomy CONCUR The full citation details ... 2002 DBLP  DOI  BibTeX  RDF name generation, verification, cryptographic protocols, set constraints
36James Heather, Steve Schneider Equal To The Task? Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF inequality tests, formal methods in security, RSA, cryptographic protocols, security models, rank functions, data independence, security verification, strand spaces
36Tom Tedrick On the History of Cryptography during WW2, and Possible New Directions for Cryptograpic Research. Search on Bibsonomy EUROCRYPT The full citation details ... 1985 DBLP  DOI  BibTeX  RDF History of Cryptography, History of War, Theory of War, Abstract Protocol Theory, Game Theoretic Cryptography, Rommel, ULTRA, Cryptographic Protocols
35Ralf Küsters On the Decidability of Cryptographic Protocols with Open-Ended Data Structures. Search on Bibsonomy CONCUR The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
35Bruno Blanchet Automatic verification of cryptographic protocols: a logic programming approach. Search on Bibsonomy PPDP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF logic programming, cryptographic protocols, automatic verification, horn clauses
35Ran Canetti Universally Composable Security: A New Paradigm for Cryptographic Protocols. Search on Bibsonomy FOCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF security analysis of protocols, cryptographic protocols, concurrent composition
35Antonio Durante, Riccardo Focardi, Roberto Gorrieri A compiler for analyzing cryptographic protocols using noninterference. Search on Bibsonomy ACM Trans. Softw. Eng. Methodol. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF process algebra, cryptographic protocols, automatic verification, noninterference, verification tool
35David Monniaux Decision Procedures for the Analysis of Cryptographic Protocols by Logics of Belief. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF formal methods, cryptographic protocols, forward chaining, BAN logic
35Marc Mehdi Ayadi, Dominique Bolignano Verification of Cryptographic Protocols: An Experiment. Search on Bibsonomy FME The full citation details ... 1997 DBLP  DOI  BibTeX  RDF security, formal methods, cryptographic protocols, Coq
35Jean Goubault-Larrecq A Method for Automatic Cryptographic Protocol Verification. Search on Bibsonomy IPDPS Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
35Daisuke Kikuchi, Naoki Kobayashi 0001 Type-Based Automated Verification of Authenticity in Cryptographic Protocols. Search on Bibsonomy ESOP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Christian Schridde, Bernd Freisleben On the Validity of the phi-Hiding Assumption in Cryptographic Protocols. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ?-Hiding assumption, Jacobi symbol, Euler’s totient function
35Aslan Askarov, Andrei Sabelfeld Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Liana Bozga, Cristian Ene, Yassine Lakhnech On the Existence of an Effective and Complete Inference System for Cryptographic Protocols. Search on Bibsonomy FoSSaCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
35Helmut Seidl, Kumar Neeraj Verma Flat and One-Variable Clauses: Complexity of Verifying Cryptographic Protocols with Single Blind Copying. Search on Bibsonomy LPAR The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
35Li Yongjian, Xue Rui Using SPIN to Model Cryptographic Protocols. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
35Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon Modular verification of security protocol code by typing. Search on Bibsonomy POPL The full citation details ... 2010 DBLP  DOI  BibTeX  RDF f7, refinement type
35Jan Jürjens Verification of low-level crypto-protocol implementations using automated theorem proving. Search on Bibsonomy MEMOCODE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Michael Backes 0001, Matthias Schunter From absence of certain vulnerabilities towards security proofs: pushing the limits of formal verification. Search on Bibsonomy NSPW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF formal methods, cryptography
33Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi Walfish Universally Composable Security with Global Setup. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Tzafrir Cohen, Joe Kilian, Erez Petrank Responsive Round Complexity and Concurrent Zero-Knowledge. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF cryptographic protocols, Zero-knowledge, concurrent zero-knowledge
33Stephen H. Brackin Using Checkable Types in Automatic Protocol Analysis. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Formal Methods, Cryptographic Protocols, Automatic Analysis
33Seung Geol Choi, Kunsoo Park, Moti Yung Short Traceable Signatures Based on Bilinear Pairings. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF anonymity, cryptographic protocols, bilinear pairings, group signatures, traceable signatures
33Jan Jürjens Composability of Secrecy. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF formal specification, Network security, refinement, modularity, cryptographic protocols, computer aided software engineering, composability, secrecy
32Zhiyao Liang, Rakesh M. Verma Improving Techniques for Proving Undecidability of Checking Cryptographic Protocols. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF insider, authentication, formal method, cryptographic protocol, undecidability, secrecy
32Yannick Chevalier, Denis Lugiez, Michaël Rusinowitch Verifying Cryptographic Protocols with Subterms Constraints. Search on Bibsonomy LPAR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Antonio Durante, Riccardo Focardi, Roberto Gorrieri CVS at Work: A Report on New Failures upon Some Cryptographic Protocols. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
32Ernie Cohen TAPS: A First-Order Verifier for Cryptographic Protocols. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
32Johann Schumann Automatic Verification of Cryptographic Protocols with SETHEO. Search on Bibsonomy CADE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
32Manuel Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano Experimental Comparison of Automatic Tools for the Formal Analysis of Cryptographic Protocols. Search on Bibsonomy DepCoS-RELCOMEX The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Pino Caballero-Gil, Candelaria Hernández-Goya, Carlos Bruno-Castañeda A Game-Theoretic Model for Two-Party Cryptographic Protocols. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Oded Goldreich 0001 Cryptography and cryptographic protocols. Search on Bibsonomy Distributed Computing The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Cryptography, Theory of computation
32Hubert Comon-Lundh, Véronique Cortier New Decidability Results for Fragments of First-Order Logic and Application to Cryptographic Protocols. Search on Bibsonomy RTA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
32Bruno Blanchet Abstracting Cryptographic Protocols by Prolog Rules. Search on Bibsonomy SAS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
32Marcelo P. Fiore, Martín Abadi Computing Symbolic Models for Verifying Cryptographic Protocols. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
32Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli Non Interference for the Analysis of Cryptographic Protocols. Search on Bibsonomy ICALP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
32Martín Abadi, Andrew D. Gordon A Bisimulation Method for Cryptographic Protocols. Search on Bibsonomy ESOP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
32Ingrid Biehl, Bernd Meyer 0002, Christoph Thiel Cryptographic Protocols Based on Real-Quadratic A-fields. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
30Michael Backes 0001, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters Conditional reactive simulatability. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Michael Backes 0001, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters Conditional Reactive Simulatability. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Liana Bozga, Yassine Lakhnech, Michaël Périn Pattern-based abstraction for verifying secrecy in protocols. Search on Bibsonomy STTT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Widening, Security, Verification, Abstract interpretation, Cryptographic protocols
30Stéphanie Delaune, Florent Jacquemard Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks. Search on Bibsonomy J. Autom. Reasoning The full citation details ... 2006 DBLP  DOI  BibTeX  RDF verification, formal methods, cryptographic protocols, dictionary attacks, probabilistic encryption
30Dennis Hofheinz, Jörn Müller-Quade Universally Composable Commitments Using Random Oracles. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF universal composition, cryptographic protocols, commitment, random oracle
30Aviel D. Rubin Extending NCP for protocols using public keys. Search on Bibsonomy ICCCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF nonmonotonic cryptographic protocols, asymmetric keys, update function, principals, binding requirements, public key protocol, protocols, certificates, inference rules
30Aggelos Kiayias, Hong-Sheng Zhou Trading Static for Adaptive Security in Universally Composable Zero-Knowledge. Search on Bibsonomy ICALP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Peeter Laud Symmetric Encryption in Automatic Analyses for Confidentiality against Active Adversaries. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas Specifying and implementing privacy-preserving cryptographic protocols. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Specification of Security Protocols, Dolev-Yao Intruder, Security-typed language, Typed MSR, Jif, Privacy, Linkability
30Frédéric Oehl, Gérard Cécé, Olga Kouchnarenko, David Sinclair Automatic Approximation for the Verification of Cryptographic Protocols. Search on Bibsonomy FASec The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
29Michael Backes 0001, Catherine A. Meadows, John C. Mitchell Relating cryptography and formal methods: a panel. Search on Bibsonomy FMSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF formal methods, cryptography, security protocols
29Fabio Martinelli Symbolic Semantics and Analysis for Crypto-CCS with (Almost) Generic Inference Systems. Search on Bibsonomy MFCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
29Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuck The faithfulness of abstract protocol analysis: message authentication. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 915 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license