1. Lecture Notes in Computer Science;M. Abadi,2001
2. Lecture Notes in Computer Science;M. Abadi,2000
3. Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology 15(2), 103–127 (2002)
4. Adao, P., Bana, G., Scedrov, A.: Computational and information-theoretic soundness and completeness of formal encryption. In: Proceedings of the 18th IEEE Computer Security Foundations Workshop (CSFW 2005), pp. 170–184. IEEE Computer Society (2005)
5. Backes, M., Pfitzmann, B.: Symmetric encryption in a simulatable dolev-yao style cryptographic library. In: Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW), pp. 204–218 (2004)