Author:
Halpern Joseph,Pucella Riccardo
Publisher
Centre pour la Communication Scientifique Directe (CCSD)
Subject
General Computer Science,Theoretical Computer Science
Reference61 articles.
1. Analyzing security protocols with secrecy types and logic programs
2. M. Abadi and V. Cortier. Deciding knowledge in security protocols under equational theories. InProc. 31st Colloquium on Automata, Languages, and Programming (ICALP'04), volume 3142 ofLecture Notes in Computer Science, 2004.
3. M. Abadi and V. Cortier. Deciding knowledge in security protocols under (many more) equational theories. InProc. 18th IEEE Computer Security Foundations Workshop (CSFW'05), pages 62-76. IEEE Computer Society Press, 2005.
4. M. Abadi and C. Fournet. Mobile values, new names, and secure communication. InProc. 28th Annual ACM Symposium on Principles of Programming Languages (POPL'01), pages 104-115, 2001.
5. M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption).Journal of Cryptology, 15 (2): 103-127, 2002.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献