Author:
Backes Michael,Pfitzmann Birgit,Waidner Michael
Subject
Computational Theory and Mathematics,Computer Science Applications,Information Systems,Theoretical Computer Science
Reference100 articles.
1. A calculus for cryptographic protocols: the spi calculus;Abadi;Information and Computation,1999
2. M. Abadi, P. Rogaway, Reconciling two views of cryptography: the computational soundness of formal encryption, in: Proceedings of the first IFIP International Conference on Theoretical Computer Science, vol. 1872 of Lecture Notes in Computer Science, Springer, 2000, pp. 3–22.
3. M. Abadi, M.R. Tuttle, A semantics for a logic of authentication, in: Proceedings of the 10th ACM Symposium on Principles of Distributed Computing (PODC), 1991, pp. 201–216.
4. M. Backes, Cryptographically Sound Analysis of Security Protocols. Ph.D. Thesis, Universität des Saarlandes, 2002. Available from: .
5. M. Backes, A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol, in: Proceedings of the ninth European Symposium on Research in Computer Security (ESORICS), vol. 3193 of Lecture Notes in Computer Science, Springer, 2004, pp. 89–108.
Cited by
57 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Stateful Protocol Composition in Isabelle/HOL;ACM Transactions on Privacy and Security;2023-04-14
2. A Core Calculus for Equational Proofs of Cryptographic Protocols;Proceedings of the ACM on Programming Languages;2023-01-09
3. Security in quantum cryptography;Reviews of Modern Physics;2022-06-29
4. Categorical composable cryptography;Lecture Notes in Computer Science;2022
5. Foundations of Programmable Secure Computation;Cryptography;2021-08-21