|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 19 occurrences of 14 keywords
|
|
|
Results
Found 23 publication records. Showing 23 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
152 | Michael Backes 0001, Birgit Pfitzmann, Michael Waidner |
Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library. |
Int. J. Inf. Sec. |
2005 |
DBLP DOI BibTeX RDF |
Dolev-Yao, Symmetric authentication, Computational soundness |
133 | Michael Backes 0001, Markus Dürmuth |
A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System. |
CSFW |
2005 |
DBLP DOI BibTeX RDF |
|
121 | Michael Backes 0001, Dominique Unruh |
Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers. |
CSF |
2008 |
DBLP DOI BibTeX RDF |
Formal methods, zero-knowledge proofs, computational soundness |
113 | Michael Backes 0001, Birgit Pfitzmann |
Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR. |
Int. J. Inf. Sec. |
2008 |
DBLP DOI BibTeX RDF |
Dolev-Yao-style, Reactive simulatability/UC, Limitations, XOR, Computational soundness |
106 | Ran Canetti, Jonathan Herzog |
Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
105 | Michael Backes 0001, Birgit Pfitzmann |
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. |
CSFW |
2004 |
DBLP DOI BibTeX RDF |
|
98 | Michael Backes 0001, Thomas Groß 0001 |
Tailoring the Dolev-Yao abstraction to web services realities. |
SWS |
2005 |
DBLP DOI BibTeX RDF |
Dolev Yao, security proof of protocols, formal method, tool support, security analysis, web services security, federated identity management, protocol model |
74 | Michael Backes 0001, Birgit Pfitzmann, Michael Waidner |
Low-Level Ideal Signatures and General Integrity Idealization. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
54 | Michael Backes 0001, Birgit Pfitzmann, Andre Scedrov |
Key-dependent message security under active attacks - BRSIM/UC-soundness of Dolev-Yao-style encryption with key cycles. |
J. Comput. Secur. |
2008 |
DBLP DOI BibTeX RDF |
|
54 | Michael Backes 0001, Birgit Pfitzmann |
Limits of the Cryptographic Realization of Dolev-Yao-style XOR. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
54 | Michael Backes 0001, Birgit Pfitzmann |
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
54 | Michael Backes 0001, Birgit Pfitzmann |
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. |
IACR Cryptol. ePrint Arch. |
2004 |
DBLP BibTeX RDF |
|
54 | Michael Backes 0001 |
A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
51 | Michael Backes 0001, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay |
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Christoph Sprenger 0001, David A. Basin |
Cryptographically-Sound Protocol-Model Abstractions. |
CSF |
2008 |
DBLP DOI BibTeX RDF |
cryptographic soundness, formal methods, theorem proving, Cryptographic protocols, simulatability |
27 | Véronique Cortier, Stéphanie Delaune, Graham Steel |
A Formal Theory of Key Conjuring. |
CSF |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Jeffrey A. Vaughan, Steve Zdancewic |
A Cryptographic Decentralized Label Model. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Daniele Micciancio, Saurabh Panjwani |
Corrupting One vs. Corrupting Many: The Case of Broadcast and Multicast Encryption. |
ICALP (2) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Michael Backes 0001, Birgit Pfitzmann |
Relating Symbolic and Cryptographic Secrecy. |
IEEE Trans. Dependable Secur. Comput. |
2005 |
DBLP DOI BibTeX RDF |
Relations between models, probabilistic computation—cryptography, Dolev-Yao model, secrecy, simulatability |
27 | Detlef Kähler, Ralf Küsters |
Constraint Solving for Contract-Signing Protocols. |
CONCUR |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Michael Backes 0001, Birgit Pfitzmann |
Relating Symbolic and Cryptographic Secrecy. |
S&P |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Michael Backes 0001, Birgit Pfitzmann |
A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol. |
IEEE J. Sel. Areas Commun. |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Paul Hankes Drielsma, Sebastian Mödersheim, Luca Viganò 0001 |
A Formalization of Off-Line Guessing for Security Protocol Analysis. |
LPAR |
2004 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #23 of 23 (100 per page; Change: )
|
|