Tests for Establishing Security Properties
暂无分享,去创建一个
[1] Vincent Cheval. APTE: An Algorithm for Proving Trace Equivalence , 2014, TACAS.
[2] Melanie Volkamer,et al. E-Voting and Identity, First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers , 2007, VOTE-ID.
[3] Martín Abadi,et al. Mobile values, new names, and secure communication , 2001, POPL '01.
[4] Bart Preneel,et al. Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings , 2010, ESORICS.
[5] Sushil Jajodia,et al. Computer Security – ESORICS 2013 , 2013, Lecture Notes in Computer Science.
[6] Jerry den Hartog,et al. Formal Verification of Privacy for RFID Systems , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.
[7] Yehuda Lindell,et al. Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries , 2007, Journal of Cryptology.
[8] Yehuda Lindell,et al. More Efficient Constant-Round Multi-Party Computation from BMR and SHE , 2016, IACR Cryptol. ePrint Arch..
[9] Mark Ryan,et al. Election Verifiability in Electronic Voting Protocols , 2010, ESORICS.
[10] Vincent Cheval. APTE : an Algorithm for Proving Trace , 2013 .
[11] Mark Ryan,et al. Trivitas: Voters Directly Verifying Votes , 2011, VoteID.
[12] Mark Ryan,et al. Analysing Unlinkability and Anonymity Using the Applied Pi Calculus , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.
[13] RyanMark,et al. Verifying privacy-type properties of electronic voting protocols , 2009 .
[14] Peter Y. A. Ryan,et al. Caveat Coercitor: Coercion-Evidence in Electronic Voting , 2013, 2013 IEEE Symposium on Security and Privacy.
[15] Marcel Keller,et al. Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits , 2013, ESORICS.
[16] W. Marsden. I and J , 2012 .
[17] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[18] Adam Langley,et al. Certificate Transparency , 2014, RFC.
[19] Mark Ryan,et al. Verifying privacy-type properties of electronic voting protocols , 2009, J. Comput. Secur..
[20] Vincent Cheval,et al. Trace equivalence decision: negative tests and non-determinism , 2011, CCS '11.