Handling Encryption in an Analysis for Secure Information Flow
暂无分享,去创建一个
[1] Martín Abadi,et al. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)* , 2001, Journal of Cryptology.
[2] Flemming Nielson,et al. Semantics with applications - a formal introduction , 1992, Wiley professional computing.
[3] F. Javier Thayer Fábrega,et al. Strand spaces: proving security protocols correct , 1999 .
[4] John C. Mitchell,et al. A probabilistic poly-time framework for protocol analysis , 1998, CCS '98.
[5] Peeter Laud. Semantics and Program Analysis of Computationally Secure Information Flow , 2001, ESOP.
[6] VolpanoDennis,et al. A sound type system for secure flow analysis , 1996 .
[7] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[8] Joshua D. Guttman,et al. Strand Spaces: Proving Security Protocols Correct , 1999, J. Comput. Secur..
[9] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[10] Birgit Pfitzmann,et al. A model for asynchronous reactive systems and its application to secure message transmission , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[11] John C. Mitchell,et al. Probabilistic Polynomial-Time Equivalence and Security Analysis , 1999, World Congress on Formal Methods.
[12] John C. Mitchell. Probabilistic Polynomial-Time Process Calculus and Security Protocol Analysis , 2001, ESOP.
[13] Geoffrey Smith,et al. Verifying secrets and relative secrecy , 2000, POPL '00.
[14] Patrick Cousot. Constructive design of a hierarchy of semantics of a transition system by abstract interpretation , 2002, Theor. Comput. Sci..
[15] Martín Abadi,et al. Formal Eavesdropping and Its Computational Interpretation , 2001, TACS.
[16] Birgit Pfitzmann,et al. Cryptographic Security of Reactive Systems Extended Abstract , 2000 .
[17] Patrick Cousot,et al. Constructive design of a hierarchy of semantics of a transition system by abstract interpretation , 2002, MFPS.
[18] Martín Abadi,et al. A Calculus for Cryptographic Protocols: The spi Calculus , 1999, Inf. Comput..
[19] Peeter Laud,et al. Computationally secure information flow , 2002 .
[20] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[21] Geoffrey Smith,et al. A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..
[22] Birgit Pfitzmann,et al. Composition and integrity preservation of secure reactive systems , 2000, CCS.
[23] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[24] Michael Backes,et al. Cryptographically sound analysis of security protocols , 2002 .
[25] K. Rustan M. Leino,et al. A semantic approach to secure information flow , 2000, Sci. Comput. Program..
[26] Dennis M. Volpano. Secure introduction of one-way functions , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.
[27] Martín Abadi,et al. A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.