Secure Composition of Cryptographic Protocols

被引:0
|
作者
Goyal, Vipul [1 ]
机构
[1] Microsoft Res, Delhi, India
来源
INFORMATION SYSTEMS SECURITY | 2011年 / 7093卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:71 / 71
页数:1
相关论文
共 50 条
  • [31] Searching for shapes in cryptographic protocols
    Doghmi, Shaddin F.
    Guttman, Joshua D.
    Thayer, F. Javier
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PROCEEDINGS, 2007, 4424 : 523 - 537
  • [32] Visualization of cryptographic protocols with GRACE
    Cattaneo, G.
    De Santis, A.
    Petrillo, U. Ferraro
    JOURNAL OF VISUAL LANGUAGES AND COMPUTING, 2008, 19 (02): : 258 - 290
  • [33] Collusion analysis of cryptographic protocols
    Low, SH
    Maxemchuk, NF
    IEEE GLOBECOM 1996 - CONFERENCE RECORD, VOLS 1-3: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 1 - 5
  • [34] INFORMATION-THEORETICALLY SECURE PROTOCOLS AND SECURITY UNDER COMPOSITION
    Kushilevitz, Eyal
    Lindell, Yehuda
    Rabin, Tal
    SIAM JOURNAL ON COMPUTING, 2010, 39 (05) : 2090 - 2112
  • [35] Cryptographic protocols with everyday objects
    Heather, James
    Schneider, Steve
    Teague, Vanessa
    FORMAL ASPECTS OF COMPUTING, 2014, 26 (01) : 37 - 62
  • [36] Sequential Rationality in Cryptographic Protocols
    Gradwohl, Ronen
    Livne, Noam
    Rosen, Alon
    2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2010, : 623 - 632
  • [37] Superposition Attacks on Cryptographic Protocols
    Damgard, Ivan
    Funder, Jakob
    Nielsen, Jesper Buus
    Salvail, Louis
    INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 142 - 161
  • [38] HIDDEN ASSUMPTIONS IN CRYPTOGRAPHIC PROTOCOLS
    BOYD, C
    IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1990, 137 (06): : 433 - 436
  • [39] Transformations between Cryptographic Protocols
    Guttman, Joshua D.
    FOUNDATIONS AND APPLICATIONS OF SECURITY ANALYSIS, 2009, 5511 : 107 - 123
  • [40] Runtime verification of cryptographic protocols
    Bauer, Andreas
    Juerjens, Jan
    COMPUTERS & SECURITY, 2010, 29 (03) : 315 - 330