A Note on the Perfect Encryption Assumption in a Process Calculus
暂无分享,去创建一个
[1] Flemming Nielson,et al. Static Analysis for the pi-Calculus with Applications to Security , 2001, Inf. Comput..
[2] Martín Abadi,et al. Formal Eavesdropping and Its Computational Interpretation , 2001, TACS.
[3] Takayasu Ito,et al. Theoretical Computer Science: Exploring New Frontiers of Theoretical Informatics , 2001, Lecture Notes in Computer Science.
[4] Robin Milner,et al. Communicating and mobile systems - the Pi-calculus , 1999 .
[5] Kim G. Larsen,et al. Bisimulation through Probabilistic Testing , 1991, Inf. Comput..
[6] Martín Abadi,et al. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)* , 2001, Journal of Cryptology.
[7] Michael Backes,et al. Cryptographically Sound and Machine-Assisted Verification of Security Protocols , 2003, STACS.
[8] Davide Sangiorgi,et al. Communicating and Mobile Systems: the π-calculus, , 2000 .
[9] Chris Hankin,et al. Approximate non-interference , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[10] John C. Mitchell,et al. Automated analysis of cryptographic protocols using Mur/spl phi/ , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[11] Martín Abadi,et al. A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.
[12] David Clark,et al. Quantitative Analysis of the Leakage of Confidential Data , 2002, QAPL.
[13] Jonathan K. Millen,et al. The Interrogator A Tool for Cryptographic Protocol Security , 1984, 1984 IEEE Symposium on Security and Privacy.
[14] Martín Abadi,et al. A Calculus for Cryptographic Protocols: The spi Calculus , 1999, Inf. Comput..
[15] Martín Abadi,et al. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)* , 2000, Journal of Cryptology.
[16] Roberto Gorrieri,et al. A Probabilistic Formulation of Imperfect Cryptography , 2003 .
[17] Benjamin C. Pierce,et al. Theoretical Aspects of Computer Software , 2001, Lecture Notes in Computer Science.
[18] Martín Abadi,et al. Secrecy by typing in security protocols , 1999, JACM.