{"title":"Symbolic Analysis of Identity-Based Protocols","authors":"D. Basin, L. Hirschi, R. Sasse","doi":"10.1007/978-3-030-19052-1_9","DOIUrl":"https://doi.org/10.1007/978-3-030-19052-1_9","url":null,"abstract":"","PeriodicalId":287445,"journal":{"name":"Foundations of Security, Protocols, and Equational Reasoning","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130061721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Musab A. Alturki, Tajana Ban Kirigin, M. Kanovich, Vivek Nigam, A. Scedrov, C. Talcott
{"title":"A Multiset Rewriting Model for Specifying and Verifying Timing Aspects of Security Protocols","authors":"Musab A. Alturki, Tajana Ban Kirigin, M. Kanovich, Vivek Nigam, A. Scedrov, C. Talcott","doi":"10.1007/978-3-030-19052-1_13","DOIUrl":"https://doi.org/10.1007/978-3-030-19052-1_13","url":null,"abstract":"","PeriodicalId":287445,"journal":{"name":"Foundations of Security, Protocols, and Equational Reasoning","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130355421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy protocols","authors":"J. Castiglione, Dusko Pavlovic, P. Seidel","doi":"10.1007/978-3-030-19052-1_12","DOIUrl":"https://doi.org/10.1007/978-3-030-19052-1_12","url":null,"abstract":"","PeriodicalId":287445,"journal":{"name":"Foundations of Security, Protocols, and Equational Reasoning","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130509770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Elisavet Kozyri, Owen Arden, A. Myers, F. Schneider
{"title":"JRIF: Reactive Information Flow Control for Java","authors":"Elisavet Kozyri, Owen Arden, A. Myers, F. Schneider","doi":"10.1007/978-3-030-19052-1_7","DOIUrl":"https://doi.org/10.1007/978-3-030-19052-1_7","url":null,"abstract":"","PeriodicalId":287445,"journal":{"name":"Foundations of Security, Protocols, and Equational Reasoning","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125081448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust Declassification by Incremental Typing","authors":"Matteo Busi, P. Degano, Letterio Galletta","doi":"10.1007/978-3-030-19052-1_6","DOIUrl":"https://doi.org/10.1007/978-3-030-19052-1_6","url":null,"abstract":"","PeriodicalId":287445,"journal":{"name":"Foundations of Security, Protocols, and Equational Reasoning","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114316015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Erin Hanna, C. Lynch, D. J. Myers, Corey Richardson
{"title":"Finding Intruder Knowledge with Cap-Matching","authors":"Erin Hanna, C. Lynch, D. J. Myers, Corey Richardson","doi":"10.1007/978-3-030-19052-1_5","DOIUrl":"https://doi.org/10.1007/978-3-030-19052-1_5","url":null,"abstract":"","PeriodicalId":287445,"journal":{"name":"Foundations of Security, Protocols, and Equational Reasoning","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131785448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Belenios: A Simple Private and Verifiable Electronic Voting System","authors":"V. Cortier, P. Gaudry, Stéphane Glondu","doi":"10.1007/978-3-030-19052-1_14","DOIUrl":"https://doi.org/10.1007/978-3-030-19052-1_14","url":null,"abstract":"","PeriodicalId":287445,"journal":{"name":"Foundations of Security, Protocols, and Equational Reasoning","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133167209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cathy Meadows: A Central Figure in Protocol Analysis","authors":"Sylvan Pinsky","doi":"10.1007/978-3-030-19052-1_1","DOIUrl":"https://doi.org/10.1007/978-3-030-19052-1_1","url":null,"abstract":"","PeriodicalId":287445,"journal":{"name":"Foundations of Security, Protocols, and Equational Reasoning","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116009315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}