Sign in
Formal to Practical Security
2009
2009
2009
Keyphrases
Publications
2009
Malika Izabachène
,
David Pointcheval
New Anonymity Notions for Identity-Based Encryption.
Formal to Practical Security
(2009)
Gergei Bana
,
Koji Hasebe
,
Mitsuhiro Okada
Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols.
Formal to Practical Security
(2009)
Toshiyuki Maeda
,
Akinori Yonezawa
Writing an OS Kernel in a Strictly and Statically Typed Language.
Formal to Practical Security
(2009)
Georg Fuchsbauer
,
David Pointcheval
Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures.
Formal to Practical Security
(2009)
Yuki Hara
,
Taiki Ishiwata
,
Junji Shikata
,
Tsutomu Matsumoto
Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment.
Formal to Practical Security
(2009)
Cas J. F. Cremers
,
Pascal Lafourcade
,
Philippe Nadeau
Comparing State Spaces in Automatic Security Protocol Analysis.
Formal to Practical Security
(2009)
Reynald Affeldt
,
Hubert Comon-Lundh
Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables.
Formal to Practical Security
(2009)
Claude Barral
,
Assia Tria
Fake Fingers in Fingerprint Recognition: Glycerin Supersedes Gelatin.
Formal to Practical Security
(2009)
Charu Arora
,
Mathieu Turuani
Validating Integrity for the Ephemerizer's Protocol with CL-Atse.
Formal to Practical Security
(2009)
Yusuke Kawamoto
,
Hideki Sakurada
,
Masami Hagiya
Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption.
Formal to Practical Security
(2009)
volume 5458, 2009
Formal to Practical Security - Papers Issued from the 2005-2008 French-Japanese Collaboration
Formal to Practical Security
5458 (2009)