Formal analysis of anonymity based on strand space model
暂无分享,去创建一个
[1] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[2] Sheikh Iqbal Ahamed,et al. Privacy in Pervasive Computing and Open Issues , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[3] Joseph Y. Halpern,et al. Anonymity and information hiding in multiagent systems , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..
[4] Joshua D. Guttman,et al. Strand Spaces: Proving Security Protocols Correct , 1999, J. Comput. Secur..
[5] Vitaly Shmatikov,et al. Information Hiding, Anonymity and Privacy: a Modular Approach , 2004, J. Comput. Secur..
[6] Nancy A. Lynch,et al. Cryptographic protocols , 1982, STOC '82.
[7] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[8] Paul F. Syverson,et al. Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[9] Paul F. Syverson,et al. Group Principals and the Formalization of Anonymity , 1999, World Congress on Formal Methods.
[10] F. Javier Thayer Fábrega,et al. Strand spaces: proving security protocols correct , 1999 .
[11] Jan van Eijck,et al. Epistemic Verification of Anonymity , 2007, VODCA@FOSAD.
[12] Steve A. Schneider,et al. CSP and Anonymity , 1996, ESORICS.
[13] Wolter Pieters,et al. Provable anonymity , 2005, FMSE '05.
[14] Mark Ryan,et al. Analysis of an Electronic Voting Protocol in the Applied Pi Calculus , 2005, ESOP.