default search action
Formal to Practical Security 2009
- Véronique Cortier, Claude Kirchner, Mitsuhiro Okada, Hideki Sakurada:
Formal to Practical Security - Papers Issued from the 2005-2008 French-Japanese Collaboration. Lecture Notes in Computer Science 5458, Springer 2009, ISBN 978-3-642-02001-8 - Reynald Affeldt, Hubert Comon-Lundh:
Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables. 1-20 - Charu Arora, Mathieu Turuani:
Validating Integrity for the Ephemerizer's Protocol with CL-Atse. 21-32 - Gergei Bana, Koji Hasebe, Mitsuhiro Okada:
Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols. 33-56 - Claude Barral, Assia Tria:
Fake Fingers in Fingerprint Recognition: Glycerin Supersedes Gelatin. 57-69 - Cas J. F. Cremers, Pascal Lafourcade, Philippe Nadeau:
Comparing State Spaces in Automatic Security Protocol Analysis. 70-94 - Georg Fuchsbauer, David Pointcheval:
Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures. 95-115 - Yuki Hara, Taiki Ishiwata, Junji Shikata, Tsutomu Matsumoto:
Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment. 116-137 - Malika Izabachène, David Pointcheval:
New Anonymity Notions for Identity-Based Encryption. 138-157 - Yusuke Kawamoto, Hideki Sakurada, Masami Hagiya:
Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption. 158-180 - Toshiyuki Maeda, Akinori Yonezawa:
Writing an OS Kernel in a Strictly and Statically Typed Language. 181-197
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.