Up a level |
(2003) Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions (Extended Abstract).
(2003) Proceedings of 1st ACM Workshop on Formal Methods in Security Engineering (FMSE) , affiliated with ACM CCS'03, Washington D.C.
(2003) Reliable broadcast in a computational hybrid model with Byzantine faults, crashes, and recoveries.
(2003) Proactive Secure Message Transmission in Asynchronous Networks.
(2003) Cryptographically Sound and Machine-Assisted Verification of Security Protocols.
(2003) A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol (Extended Abstract).
(2003) A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol.
(2003) Intransitive Non-Interference for Cryptographic Purposes.
(2003) A Toolkit for Managing Enterprise Privacy Policies.
(2003) A Composable Cryptographic Library with Nested Operations.
(2003) Reactively Secure Signature Schemes.
(2003) Security in Business Process Engineering.
(2003) Symmetric Authentication Within a Simulatable Cryptographic Library.
(2003) From Absence of Certain Vulnerabilities towards Security Proofs - Pushing the Limits of Formal Verification.