On Backward-Style Anonymity Verification
暂无分享,去创建一个
Ken Mano | Hideki Sakurada | Yasuyuki Tsukada | Yoshinobu Kawabe | Hideki Sakurada | Yoshinobu Kawabe | K. Mano | Yasuyuki Tsukada
[1] Steve A. Schneider,et al. CSP and Anonymity , 1996, ESORICS.
[2] Nancy A. Lynch,et al. Computer-Assisted Simulation Proofs , 1993, CAV.
[3] Martín Abadi,et al. Mobile values, new names, and secure communication , 2001, POPL '01.
[4] Mark Ryan,et al. Analysis of an Electronic Voting Protocol in the Applied Pi Calculus , 2005, ESOP.
[5] Atsushi Fujioka,et al. A Practical Secret Voting Scheme for Large Scale Elections , 1992, AUSCRYPT.
[6] Hideki Sakurada,et al. An Adversary Model for Simulation-Based Anonymity Proof , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[7] Mark Ryan,et al. Coercion-resistance and receipt-freeness in electronic voting , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[8] Martín Abadi,et al. Private authentication , 2004, Theor. Comput. Sci..
[9] Vitaly Shmatikov,et al. Information Hiding, Anonymity and Privacy: a Modular Approach , 2004, J. Comput. Secur..
[10] Bruno Blanchet,et al. An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[11] Nancy A. Lynch,et al. Forward and Backward Simulations: I. Untimed Systems , 1995, Inf. Comput..
[12] Stephen J. Garland,et al. An Overview of Larch , 1993, Functional Programming, Concurrency, Simulation and Automated Reasoning.
[13] Ken Mano,et al. Theorem-proving anonymity of infinite-state systems , 2007, Inf. Process. Lett..
[14] Joseph Y. Halpern,et al. Anonymity and information hiding in multiagent systems , 2005 .