Author:
Backes Michael,Dürmuth Markus,Hofheinz Dennis,Küsters Ralf
Publisher
Springer Berlin Heidelberg
Reference34 articles.
1. Abadi, M., Lamport, L.: Conjoining specifications. ACM Transactional on Programmming Languages and Systems 17(3), 507–534 (1995)
2. Backes, M., Dürmuth, M., Hofheinz, D., Küsters, R.: Conditional Reactive Simulatability. Technical Report 132, Cryptology ePrint Archive (2006), Online available at:
http://eprint.iacr.org/2006/132.ps
3. Backes, M., Pfitzmann, B.: Symmetric encryption in a simulatable dolev-yao style cryptographic library. In: 17th IEEE Computer Security Foundations Workshop, Proceedings of CSFW 2004, pp. 204–218. IEEE Computer Society, Los Alamitos (2004)
4. Lecture Notes in Computer Science;M. Backes,2005
5. Backes, M., Pfitzmann, B., Scedrov, A.: Key-dependent message security under active attacks. ePrint Archive, 2005/421 (2006)
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献