Author:
Backes Michael,Pfitzmann Birgit
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference59 articles.
1. Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. In: Proc. 31st International Colloquium on Automata, Languages and Programming (ICALP), LNCS, vol. 3124, pp. 46–58. Springer (2004)
2. Abadi, M., Jürjens, J.: Formal eavesdropping and its computational interpretation. In: Proc. 4th International Symposium on Theoretical Aspects of Computer Software (TACS), pp. 82–94 (2001)
3. Abadi, M., Rogaway, P.: Reconciling two views of cryptography: The computational soundness of formal encryption. In: Proc. 1st IFIP International Conference on Theoretical Computer Science, LNCS, vol. 1872, pp. 3–22. Springer (2000)
4. Backes, M.: A cryptographically sound Dolev–Yao style security proof of the Otway–Rees protocol. Research Report RZ 3539, IBM Research (2004)
5. Backes, M., Dürmuth, M.: A cryptographically sound Dolev–Yao style security proof of an electronic payment system. In: Proc. 18th IEEE Computer Security Foundations Workshop (CSFW), pp. 78–93 (2005)