Author:
Cortier Véronique,Kremer Steve,Warinschi Bogdan
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Computational Theory and Mathematics,Software
Reference105 articles.
1. Adão, P., Bana, G., Herzog, J., Scedrov, A.: Soundness of formal encryption in the presence of key-cycles. In: Proc. 10th European Symposium on Research in Computer Security (ESORICS’05). LNCS, vol. 3679, pp. 374–396 (2005)
2. Adão, P., Bana, G., Scedrov, A.: Computational and information-theoretic soundness and completeness of formal encryption. In: Proc. 18th IEEE Computer Security Foundations Workshop (CSFW’05), pp. 170–184 (2005)
3. Abadi, M., Baudet, M., Warinschi, B.: Guessing attacks and the computational soundness of static equivalence. In: Proc. 9th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS’06). LNCS, vol. 3921 (2006)
4. Abadi, M., Corin, R., Fournet, C.: Computational secrecy by typing for the pi calculus. In: Programming Languages and Systems, 4th Asian Symposium, (APLAS’06), vol. 4279 of LNCS, pp. 253–269. Springer (2006)
5. Adão, P., Fournet, C.: Cryptographically sound implementations for communicating processes. In: Automata, Languages and Programming, 33rd International Colloquium (ICALP’06). LNCS, vol. 4052, pp. 83–94. Springer, Heidelberg (2006)
Cited by
35 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献