Joint Workshop on Theory of Security and Applications最新文献

筛选
英文 中文
Formal Analysis of the EMV Protocol Suite EMV协议套件的形式化分析
Joint Workshop on Theory of Security and Applications Pub Date : 2011-03-31 DOI: 10.1007/978-3-642-27375-9_7
Joeri de Ruiter, E. Poll
{"title":"Formal Analysis of the EMV Protocol Suite","authors":"Joeri de Ruiter, E. Poll","doi":"10.1007/978-3-642-27375-9_7","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_7","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122611286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
Multiple Congruence Relations, First-Order Theories on Terms, and the Frames of the Applied Pi-Calculus 多重同余关系,项的一阶理论,以及应用pi微积分的框架
Joint Workshop on Theory of Security and Applications Pub Date : 2011-03-31 DOI: 10.1007/978-3-642-27375-9_10
Florent Jacquemard, É. Lozes, R. Treinen, Jules Villard
{"title":"Multiple Congruence Relations, First-Order Theories on Terms, and the Frames of the Applied Pi-Calculus","authors":"Florent Jacquemard, É. Lozes, R. Treinen, Jules Villard","doi":"10.1007/978-3-642-27375-9_10","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_10","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114165550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Model-Checking Secure Information Flow for Multi-threaded Programs 多线程程序安全信息流的模型检查
Joint Workshop on Theory of Security and Applications Pub Date : 2011-03-31 DOI: 10.1007/978-3-642-27375-9_9
M. Huisman, Henri-Charles Blondeel
{"title":"Model-Checking Secure Information Flow for Multi-threaded Programs","authors":"M. Huisman, Henri-Charles Blondeel","doi":"10.1007/978-3-642-27375-9_9","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_9","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114433123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Constructive Cryptography - A New Paradigm for Security Definitions and Proofs 构造密码学——安全定义和证明的新范式
Joint Workshop on Theory of Security and Applications Pub Date : 2011-03-31 DOI: 10.1007/978-3-642-27375-9_3
U. Maurer
{"title":"Constructive Cryptography - A New Paradigm for Security Definitions and Proofs","authors":"U. Maurer","doi":"10.1007/978-3-642-27375-9_3","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_3","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128140451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 161
Automated Code Injection Prevention for Web Applications Web应用程序的自动代码注入预防
Joint Workshop on Theory of Security and Applications Pub Date : 2011-03-31 DOI: 10.1007/978-3-642-27375-9_11
Zhengqin Luo, Tamara Rezk, M. Serrano
{"title":"Automated Code Injection Prevention for Web Applications","authors":"Zhengqin Luo, Tamara Rezk, M. Serrano","doi":"10.1007/978-3-642-27375-9_11","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_11","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125325782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
G2C: Cryptographic Protocols from Goal-Driven Specifications G2C:来自目标驱动规范的加密协议
Joint Workshop on Theory of Security and Applications Pub Date : 2011-03-31 DOI: 10.1007/978-3-642-27375-9_4
M. Backes, Matteo Maffei, Kim Pecina, Raphael M. Reischuk
{"title":"G2C: Cryptographic Protocols from Goal-Driven Specifications","authors":"M. Backes, Matteo Maffei, Kim Pecina, Raphael M. Reischuk","doi":"10.1007/978-3-642-27375-9_4","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_4","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"134 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116578758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Union and Intersection Types for Secure Protocol Implementations 安全协议实现的并集和交集类型
Joint Workshop on Theory of Security and Applications Pub Date : 2011-03-31 DOI: 10.1007/978-3-642-27375-9_1
M. Backes, Catalin Hritcu, Matteo Maffei
{"title":"Union and Intersection Types for Secure Protocol Implementations","authors":"M. Backes, Catalin Hritcu, Matteo Maffei","doi":"10.1007/978-3-642-27375-9_1","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_1","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134590771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Modeling Long-Term Signature Validation for Resolution of Dispute 为解决争议建立长期签名验证模型
Joint Workshop on Theory of Security and Applications Pub Date : 2011-03-31 DOI: 10.1007/978-3-642-27375-9_5
Moez Ben MBarka, F. Krief, Olivier Ly
{"title":"Modeling Long-Term Signature Validation for Resolution of Dispute","authors":"Moez Ben MBarka, F. Krief, Olivier Ly","doi":"10.1007/978-3-642-27375-9_5","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_5","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116136904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Soundness of Removing Cancellation Identities in Protocol Analysis under Exclusive-OR 异或条件下协议分析中去除抵消身份的合理性
Joint Workshop on Theory of Security and Applications Pub Date : 2011-03-31 DOI: 10.1007/978-3-642-27375-9_12
S. Malladi
{"title":"Soundness of Removing Cancellation Identities in Protocol Analysis under Exclusive-OR","authors":"S. Malladi","doi":"10.1007/978-3-642-27375-9_12","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_12","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132498645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure Composition of Protocols 协议的安全组合
Joint Workshop on Theory of Security and Applications Pub Date : 2011-03-31 DOI: 10.1007/978-3-642-27375-9_2
V. Cortier
{"title":"Secure Composition of Protocols","authors":"V. Cortier","doi":"10.1007/978-3-642-27375-9_2","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_2","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132680707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信