Up a level |
(2005) Quantifying Probabilistic Information Flow in Computational Reactive Systems.
(2005) Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions.
(2005) Public-Key Steganography with Active Attacks.
(2005) Lazy Revocation in Cryptographic File Systems.
(2005) Anonymous yet accountable access control.
(2005) Compositional Analysis of Contract Signing Protocols.
(2005) A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System.
(2005) Tailoring the Dolev-Yao Abstraction to Web Services Realities - A Comprehensive Wish List.
(2005) On Fairness in Simulatability-based Cryptographic Systems.
(2005) Limits of the Cryptographic Realization of Dolev-Yao-style XOR.
(2005) Relating Symbolic and Cryptographic Secrecy.
(2005) Relating Symbolic and Cryptographic Secrecy.
(2005) Reactively Secure Signature Schemes.
(2005) Symmetric Authentication Within a Simulatable Cryptographic Library.
(2005) Proceedings of 3rd International Workshop on Security and Concurrency (SecCo), affiliated with CONCUR'05, San Francisco, CA.