Author:
Arsac Wihem,Bella Giampaolo,Chantry Xavier,Compagna Luca
Publisher
Springer Berlin Heidelberg
Reference10 articles.
1. Bellare, M., Rogaway, P.: Provably secure session key distribution– the three party case. In: Proceedings 27th Annual Symposium on the Theory of Computing, pp. 57–66. ACM (1995)
2. Lecture Notes in Computer Science;M. Abadi,2000
3. Gollmann, D.: On the verification of cryptographic protocols — a tale of two committees. In: Proc. of the Workshop on Secure Architectures and Information Flow. ENTCS 32, Elsevier Science (2000)
4. Backes, M., Pfitzmann, B.: Relating symbolic and cryptographic secrecy. In: IEEE Symposium on Security and Privacy (2005)
5. Bella, G., Bistarelli, S., Massacci, F.: Retaliation: Can we live with flaws? In: Essaidi, M., Thomas, J. (eds.) Proc. of the Nato Advanced Research Workshop on Information Security Assurance and Security. Nato through Science, vol. 6, pp. 3–14. IOS Press (2006),
http://www.iospress.nl/loadtop/load.php?isbn=9781586036782