Login / Signup
Foundations of Security, Protocols, and Equational Reasoning
2019
2019
2019
Keyphrases
Publications
2019
Vivek Nigam
,
Carolyn L. Talcott
,
Abraão Aires Urquiza
Symbolic Timed Trace Equivalence.
Foundations of Security, Protocols, and Equational Reasoning
(2019)
Jonathan K. Millen
A Long, Slow Conversation.
Foundations of Security, Protocols, and Equational Reasoning
(2019)
Jason Castiglione
,
Dusko Pavlovic
,
Peter-Michael Seidel
Privacy Protocols.
Foundations of Security, Protocols, and Equational Reasoning
(2019)
Erin Hanna
,
Christopher Lynch
,
David Jaz Myers
,
Corey Richardson
Finding Intruder Knowledge with Cap-Matching.
Foundations of Security, Protocols, and Equational Reasoning
(2019)
Moses D. Liskov
,
Joshua D. Guttman
,
John D. Ramsdell
,
Paul D. Rowe
,
F. Javier Thayer
Enrich-by-Need Protocol Analysis for Diffie-Hellman.
Foundations of Security, Protocols, and Equational Reasoning
(2019)
Paul Syverson
Key Reminiscences.
Foundations of Security, Protocols, and Equational Reasoning
(2019)
David A. Basin
,
Lucca Hirschi
,
Ralf Sasse
Symbolic Analysis of Identity-Based Protocols.
Foundations of Security, Protocols, and Equational Reasoning
(2019)
Véronique Cortier
,
Pierrick Gaudry
,
Stéphane Glondu
Belenios: A Simple Private and Verifiable Electronic Voting System.
Foundations of Security, Protocols, and Equational Reasoning
(2019)
Andrew William Roscoe
,
Lei Wang
Key Agreement via Protocols.
Foundations of Security, Protocols, and Equational Reasoning
(2019)
Matteo Busi
,
Pierpaolo Degano
,
Letterio Galletta
Robust Declassification by Incremental Typing.
Foundations of Security, Protocols, and Equational Reasoning
(2019)
Elisavet Kozyri
,
Owen Arden
,
Andrew C. Myers
,
Fred B. Schneider
JRIF: Reactive Information Flow Control for Java.
Foundations of Security, Protocols, and Equational Reasoning
(2019)
Musab A. AlTurki
,
Tajana Ban Kirigin
,
Max I. Kanovich
,
Vivek Nigam
,
Andre Scedrov
,
Carolyn L. Talcott
A Multiset Rewriting Model for Specifying and Verifying Timing Aspects of Security Protocols.
Foundations of Security, Protocols, and Equational Reasoning
(2019)
Sylvan Pinsky
Cathy Meadows: A Central Figure in Protocol Analysis.
Foundations of Security, Protocols, and Equational Reasoning
(2019)
Santiago Escobar
,
José Meseguer
Canonical Narrowing with Irreducibility Constraints as a Symbolic Protocol Analysis Method.
Foundations of Security, Protocols, and Equational Reasoning
(2019)
volume 11565, 2019
Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows
Foundations of Security, Protocols, and Equational Reasoning
11565 (2019)