Security Proof with Dishonest Keys (English)
- New search for: Comon-Lundh, H.
- New search for: Cortier, V.
- New search for: Scerri, G.
- New search for: Comon-Lundh, H.
- New search for: Cortier, V.
- New search for: Scerri, G.
- New search for: Degano, P.
- New search for: Guttman, J.D.
In:
Principles of security and trust
7215
;
149-168
;
2012
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Security Proof with Dishonest Keys
-
Contributors:Comon-Lundh, H. ( author ) / Cortier, V. ( author ) / Scerri, G. ( author ) / Degano, P. / Guttman, J.D.
-
Conference:International conference; 1st, Principles of security and trust ; 2012 ; Tallinn, Estonia
-
Published in:Principles of security and trust , 7215 ; 149-168LECTURE NOTES IN COMPUTER SCIENCE , 7215 ; 149-168
-
Publisher:
- New search for: Springer
-
Place of publication:Heidelberg
-
Publication date:2012-01-01
-
Size:20 pages
-
Remarks:Includes bibliographical references and index
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Differential Privacy and the Power of (Formalizing) Negative Thinking (Extended Abstract)Dwork, C. et al. | 2012
- 3
-
Security Protocol Verification: Symbolic and Computational ModelsBlanchet, B. et al. | 2012
- 30
-
Analysing Routing Protocols: Four Nodes Topologies Are SufficientCortier, V. / Degrieck, J. / Delaune, S. et al. | 2012
- 51
-
Parametric Verification of Address Space SeparationFranklin, J. / Chaki, S. / Datta, A. / McCune, J.M. / Vasudevan, A. et al. | 2012
- 69
-
Verification of Security Protocols with Lists: From Length One to Unbounded LengthPaiola, M. / Blanchet, B. et al. | 2012
- 89
-
Privacy Supporting Cloud Computing: ConfiChair, a Case StudyArapinis, M. / Bursuc, S. / Ryan, M. et al. | 2012
- 109
-
A Formal Analysis of the Norwegian E-voting ProtocolCortier, V. / Wiedling, C. et al. | 2012
- 129
-
Provably Repairing the ISO/IEC 9798 Standard for Entity AuthenticationBasin, D. / Cremers, C. / Meier, S. et al. | 2012
- 149
-
Security Proof with Dishonest KeysComon-Lundh, H. / Cortier, V. / Scerri, G. et al. | 2012
- 169
-
Reduction of Equational Theories for Verification of Trace Equivalence: Re-encryption, Associativity and CommutativityArapinis, M. / Bursuc, S. / Ryan, M.D. et al. | 2012
- 189
-
Towards Unconditional Soundness: Computationally Complete Symbolic AttackerBana, G. / Comon-Lundh, H. et al. | 2012
- 209
-
Verified Indifferentiable Hashing into Elliptic CurvesBarthe, G. / Gregoire, B. / Heraud, S. / Olmedo, F. / Beguelin, S.Z. et al. | 2012
- 229
-
Provable De-anonymization of Large Datasets with Sparse DimensionsDatta, A. / Sharma, D. / Sinha, A. et al. | 2012
- 249
-
Revisiting Botnet Models and Their Implications for Takedown StrategiesYen, T.-F. / Reiter, M.K. et al. | 2012
- 269
-
A Game-Theoretic Analysis of Cooperation in Anonymity NetworksYang, M. / Sassone, V. / Hamadou, S. et al. | 2012
- 290
-
Deciding Selective Declassification of Petri NetsBest, E. / Darondeau, P. et al. | 2012
- 309
-
Enforceable Security Policies RevisitedBasin, D. / Juge, V. / Klaedtke, F. / Zalinescu, E. et al. | 2012
- 329
-
Towards Incrementalization of Holistic HyperpropertiesMilushev, D. / Clarke, D. et al. | 2012
- 349
-
Type-Based Analysis of PKCS#11 Key ManagementCentenaro, M. / Focardi, R. / Luccio, F.L. et al. | 2012
- 369
-
A Certificate Infrastructure for Machine-Checked Proofs of Conditional Information FlowAmtoft, T. / Dodds, J. / Zhang, Z. / Appel, A. / Beringer, L. / Hatcliff, J. / Ou, X. / Cousino, A. et al. | 2012
- 390
-
PTaCL: A Language for Attribute-Based Access Control in Open SystemsCrampton, J. / Morisset, C. et al. | 2012
- 410
-
A Core Calculus for ProvenanceAcar, U.A. / Ahmed, A. / Cheney, J. / Perera, R. et al. | 2012