Author:
Backes Michael,Dürmuth Markus,Hofheinz Dennis,Küsters Ralf
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference37 articles.
1. Abadi M. and Lamport L. (1995). Conjoining specifications. ACM Trans. Programmm. Lang. Systems 17(3): 507–534
2. Backes, M., Dürmuth, M., Hofheinz, D., Küsters, R.: Conditional reactive simulatability. In: Computer Security, Proceedings of ESORICS 2006, Lecture Notes in Computer Science, vol. 4189, pp. 424–443. Springer, Heidelberg (2006)
3. Backes, M., Pfitzmann, B.: Symmetric encryption in a simulatable dolev-yao style cryptographic library. In: 17th IEEE Computer Security Foundations Workshop, Proceedings of CSFW 2004, pp. 204–218. IEEE Computer Society (2004)
4. Backes, M., Pfitzmann, B.: Limits of the cryptographic realization of Dolev-Yao-style XOR. In: Computer Security, Proceedings of ESORICS 2005, Lecture Notes in Computer Science, vol. 3679, pp. 178–196. Springer, Heidelberg (2005)
5. Backes, M., Pfitzmann, B., Scedrov, A.: Key-dependent message security under active attacks–BRSIM/UC-soundness of symbolic encryption with key cycles. In: 20th IEEE Computer Security Foundations Symposium, Proceedings of CSF 2007, pp. 112–124. IEEE Computer Society (2007)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献