Foundations of Security, Protocols, and Equational Reasoning最新文献

筛选
英文 中文
Symbolic Analysis of Identity-Based Protocols 基于身份协议的符号分析
Foundations of Security, Protocols, and Equational Reasoning Pub Date : 2019-04-28 DOI: 10.1007/978-3-030-19052-1_9
D. Basin, L. Hirschi, R. Sasse
{"title":"Symbolic Analysis of Identity-Based Protocols","authors":"D. Basin, L. Hirschi, R. Sasse","doi":"10.1007/978-3-030-19052-1_9","DOIUrl":"https://doi.org/10.1007/978-3-030-19052-1_9","url":null,"abstract":"","PeriodicalId":287445,"journal":{"name":"Foundations of Security, Protocols, and Equational Reasoning","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130061721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Multiset Rewriting Model for Specifying and Verifying Timing Aspects of Security Protocols 用于指定和验证安全协议时间方面的多集重写模型
Foundations of Security, Protocols, and Equational Reasoning Pub Date : 2019-04-11 DOI: 10.1007/978-3-030-19052-1_13
Musab A. Alturki, Tajana Ban Kirigin, M. Kanovich, Vivek Nigam, A. Scedrov, C. Talcott
{"title":"A Multiset Rewriting Model for Specifying and Verifying Timing Aspects of Security Protocols","authors":"Musab A. Alturki, Tajana Ban Kirigin, M. Kanovich, Vivek Nigam, A. Scedrov, C. Talcott","doi":"10.1007/978-3-030-19052-1_13","DOIUrl":"https://doi.org/10.1007/978-3-030-19052-1_13","url":null,"abstract":"","PeriodicalId":287445,"journal":{"name":"Foundations of Security, Protocols, and Equational Reasoning","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130355421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Privacy protocols 隐私协议
Foundations of Security, Protocols, and Equational Reasoning Pub Date : 2019-04-11 DOI: 10.1007/978-3-030-19052-1_12
J. Castiglione, Dusko Pavlovic, P. Seidel
{"title":"Privacy protocols","authors":"J. Castiglione, Dusko Pavlovic, P. Seidel","doi":"10.1007/978-3-030-19052-1_12","DOIUrl":"https://doi.org/10.1007/978-3-030-19052-1_12","url":null,"abstract":"","PeriodicalId":287445,"journal":{"name":"Foundations of Security, Protocols, and Equational Reasoning","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130509770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
JRIF: Reactive Information Flow Control for Java JRIF: Java响应式信息流控制
Foundations of Security, Protocols, and Equational Reasoning Pub Date : 2016-02-12 DOI: 10.1007/978-3-030-19052-1_7
Elisavet Kozyri, Owen Arden, A. Myers, F. Schneider
{"title":"JRIF: Reactive Information Flow Control for Java","authors":"Elisavet Kozyri, Owen Arden, A. Myers, F. Schneider","doi":"10.1007/978-3-030-19052-1_7","DOIUrl":"https://doi.org/10.1007/978-3-030-19052-1_7","url":null,"abstract":"","PeriodicalId":287445,"journal":{"name":"Foundations of Security, Protocols, and Equational Reasoning","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125081448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Key Reminiscences 重要的回忆
Foundations of Security, Protocols, and Equational Reasoning Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-19052-1_3
P. Syverson
{"title":"Key Reminiscences","authors":"P. Syverson","doi":"10.1007/978-3-030-19052-1_3","DOIUrl":"https://doi.org/10.1007/978-3-030-19052-1_3","url":null,"abstract":"","PeriodicalId":287445,"journal":{"name":"Foundations of Security, Protocols, and Equational Reasoning","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121751825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Symbolic Timed Trace Equivalence 符号时间跟踪等效
Foundations of Security, Protocols, and Equational Reasoning Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-19052-1_8
Vivek Nigam, C. Talcott, Abraão Aires Urquiza
{"title":"Symbolic Timed Trace Equivalence","authors":"Vivek Nigam, C. Talcott, Abraão Aires Urquiza","doi":"10.1007/978-3-030-19052-1_8","DOIUrl":"https://doi.org/10.1007/978-3-030-19052-1_8","url":null,"abstract":"","PeriodicalId":287445,"journal":{"name":"Foundations of Security, Protocols, and Equational Reasoning","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127589163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Robust Declassification by Incremental Typing 基于增量分型的鲁棒解密
Foundations of Security, Protocols, and Equational Reasoning Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-19052-1_6
Matteo Busi, P. Degano, Letterio Galletta
{"title":"Robust Declassification by Incremental Typing","authors":"Matteo Busi, P. Degano, Letterio Galletta","doi":"10.1007/978-3-030-19052-1_6","DOIUrl":"https://doi.org/10.1007/978-3-030-19052-1_6","url":null,"abstract":"","PeriodicalId":287445,"journal":{"name":"Foundations of Security, Protocols, and Equational Reasoning","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114316015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Finding Intruder Knowledge with Cap-Matching 用帽匹配寻找入侵者知识
Foundations of Security, Protocols, and Equational Reasoning Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-19052-1_5
Erin Hanna, C. Lynch, D. J. Myers, Corey Richardson
{"title":"Finding Intruder Knowledge with Cap-Matching","authors":"Erin Hanna, C. Lynch, D. J. Myers, Corey Richardson","doi":"10.1007/978-3-030-19052-1_5","DOIUrl":"https://doi.org/10.1007/978-3-030-19052-1_5","url":null,"abstract":"","PeriodicalId":287445,"journal":{"name":"Foundations of Security, Protocols, and Equational Reasoning","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131785448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Belenios: A Simple Private and Verifiable Electronic Voting System Belenios:一个简单的私人和可验证的电子投票系统
Foundations of Security, Protocols, and Equational Reasoning Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-19052-1_14
V. Cortier, P. Gaudry, Stéphane Glondu
{"title":"Belenios: A Simple Private and Verifiable Electronic Voting System","authors":"V. Cortier, P. Gaudry, Stéphane Glondu","doi":"10.1007/978-3-030-19052-1_14","DOIUrl":"https://doi.org/10.1007/978-3-030-19052-1_14","url":null,"abstract":"","PeriodicalId":287445,"journal":{"name":"Foundations of Security, Protocols, and Equational Reasoning","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133167209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Cathy Meadows: A Central Figure in Protocol Analysis 凯西·梅多斯:协议分析的核心人物
Foundations of Security, Protocols, and Equational Reasoning Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-19052-1_1
Sylvan Pinsky
{"title":"Cathy Meadows: A Central Figure in Protocol Analysis","authors":"Sylvan Pinsky","doi":"10.1007/978-3-030-19052-1_1","DOIUrl":"https://doi.org/10.1007/978-3-030-19052-1_1","url":null,"abstract":"","PeriodicalId":287445,"journal":{"name":"Foundations of Security, Protocols, and Equational Reasoning","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116009315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信