Static Validation of a Voting Protocol
暂无分享,去创建一个
Hanne Riis Nielson | Christoffer Rosenkilde Nielsen | Esben Heltoft Andersen | H. R. Nielson | Esben Heltoft Andersen
[1] Mark Ryan,et al. Analysis of an Electronic Voting Protocol in the Applied Pi Calculus , 2005, ESOP.
[2] Flemming Nielson,et al. Flow Logics for Constraint Based Analysis , 1998, CC.
[3] Flemming Nielson,et al. Automatic validation of protocol narration , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..
[4] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[5] Martín Abadi,et al. Mobile values, new names, and secure communication , 2001, POPL '01.
[6] Paul Syverson,et al. A Taxonomy of Replay Attacks , 1994 .
[7] Flemming Nielson,et al. Validating firewalls using flow logics , 2002, Theor. Comput. Sci..
[8] Flemming Nielson,et al. Automated Analysis of Security in Networking Systems , 2004 .
[9] Mark A. Herschberg,et al. Secure electronic voting over the World Wide Web , 1997 .
[10] Hanne Riis Nielson,et al. Using static analysis to validate the SAML single sign-on protocol , 2005, WITS '05.
[11] Atsushi Fujioka,et al. A Practical Secret Voting Scheme for Large Scale Elections , 1992, AUSCRYPT.
[12] Flemming Nielson,et al. Principles of Program Analysis , 1999, Springer Berlin Heidelberg.
[13] Kazue Sako,et al. Receipt-Free Mix-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth , 1995, EUROCRYPT.
[14] Amerson H Lin. Automated Analysis of Security APIs , 2005 .
[15] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[16] Martín Abadi,et al. Security Protocols and Specifications , 1999, FoSSaCS.
[17] Flemming Nielson,et al. A Succinct Solver for ALFP , 2002, Nord. J. Comput..
[18] Davide Sangiorgi,et al. Communicating and Mobile Systems: the π-calculus, , 2000 .
[19] Kazue Sako,et al. Efficient Receipt-Free Voting Based on Homomorphic Encryption , 2000, EUROCRYPT.
[20] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[21] Flemming Nielson,et al. A calculus for control flow analysis of security protocols , 2004, International Journal of Information Security.
[22] Alan Bundy,et al. Constructing Induction Rules for Deductive Synthesis Proofs , 2006, CLASE.
[23] Hubert Comon,et al. Tree automata techniques and applications , 1997 .
[24] Martín Abadi,et al. A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.
[25] Moni Naor,et al. Bit Commitment Using Pseudo-Randomness , 1989, CRYPTO.
[26] Gavin Lowe,et al. An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..
[27] C. A. R. Hoare,et al. Communicating Sequential Processes (Reprint) , 1983, Commun. ACM.
[28] Flemming Nielson,et al. Flow Logic: A Multi-paradigmatic Approach to Static Analysis , 2002, The Essence of Computation.
[29] Flemming Nielson,et al. Static validation of security protocols , 2005, J. Comput. Secur..
[30] Bruno Blanchet,et al. An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[31] Robin Milner,et al. Communicating and mobile systems - the Pi-calculus , 1999 .
[32] Lorrie Faith Cranor,et al. Design and Implementation of a Practical Security-Conscious Electronic Polling System , 1996 .
[33] Josh Benaloh. Verifiable secret-ballot elections , 1987 .