An Implementation of TLS 1.2 with Verified Cryptographic Security (English)
- New search for: Fournet, C.
- New search for: Bhargavan, K.
- New search for: Kohlweiss, M.
- New search for: Pironti, A.
- New search for: Strub, P.-Y.
- New search for: Fournet, C.
- New search for: Bhargavan, K.
- New search for: Kohlweiss, M.
- New search for: Pironti, A.
- New search for: Strub, P.-Y.
- New search for: Basin, David
- New search for: Mitchell, John C.
In:
Principles of security and trust
7796
;
XVII
;
2013
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:An Implementation of TLS 1.2 with Verified Cryptographic Security
-
Contributors:Fournet, C. ( author ) / Bhargavan, K. ( author ) / Kohlweiss, M. ( author ) / Pironti, A. ( author ) / Strub, P.-Y. ( author ) / Basin, David / Mitchell, John C.
-
Conference:International conference; 2nd, Principles of security and trust ; 2013 ; Rome
-
Published in:Principles of security and trust , 7796 ; XVIILECTURE NOTES IN COMPUTER SCIENCE , 7796 ; XVII
-
Publisher:
- New search for: Springer
-
Place of publication:Heidelberg
-
Publication date:2013-01-01
-
Size:XVII
-
Remarks:Includes bibliographical references and author index. Also issued online.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Formal Analysis of Privacy for Routing Protocols in Mobile Ad Hoc NetworksChretien, R. / Delaune, S. et al. | 2013
- 21
-
Practical Everlasting PrivacyArapinis, M. / Cortier, V. / Kremer, S. / Ryan, M. et al. | 2013
- 41
-
A Differentially Private Mechanism of Optimal Utility for a Region of PriorsElSalamouny, E. / Chatzikokolakis, K. / Palamidessi, C. et al. | 2013
- 63
-
Proved Generation of Implementations from Computationally Secure Protocol SpecificationsCade, D. / Blanchet, B. et al. | 2013
- 83
-
Sound Security Protocol TransformationsNguyen, B.T. / Sprenger, C. et al. | 2013
- 105
-
Logical Foundations of Secure Resource Management in Protocol ImplementationsBugliesi, M. / Calzavara, S. / Eigner, F. / Maffei, M. et al. | 2013
- 126
-
Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web StorageBansal, C. / Bhargavan, K. / Delignat-Lavaud, A. / Maffeis, S. et al. | 2013
- 147
-
Lazy Mobile IntrudersModersheim, S.A. / Nielson, F. / Nielson, H.R. et al. | 2013
- 167
-
On Layout Randomization for Arrays and FunctionsAbadi, M. / Planul, J. et al. | 2013
- 186
-
A Theory of Agreements and ProtectionBartoletti, M. / Cimoli, T. / Zunino, R. et al. | 2013
- 206
-
Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized VerificationBackes, M. / Bendun, F. / Unruh, D. et al. | 2013
- 226
-
Proving More Observational Equivalences with ProVerifCheval, V. / Blanchet, B. et al. | 2013
- 247
-
Formal Verification of e-Auction ProtocolsDreier, J. / Lafourcade, P. / Lakhnech, Y. et al. | 2013
- 267
-
Sessions and Separability in Security ProtocolsCarbone, M. / Guttman, J.D. et al. | 2013
- XV
-
Computer-Aided Cryptographic ProofsBarthe, G. et al. | 2013
-
An Implementation of TLS 1.2 with Verified Cryptographic SecurityFournet, C. / Bhargavan, K. / Kohlweiss, M. / Pironti, A. / Strub, P.-Y. et al. | 2013