default search action
Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows, 2019
- Joshua D. Guttman, Carl E. Landwehr, José Meseguer, Dusko Pavlovic:
Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows. Lecture Notes in Computer Science 11565, Springer 2019, ISBN 978-3-030-19051-4 - Sylvan Pinsky:
Cathy Meadows: A Central Figure in Protocol Analysis. 1-5 - Jonathan K. Millen:
A Long, Slow Conversation. 6-7 - Paul Syverson:
Key Reminiscences. 8-14 - Santiago Escobar, José Meseguer:
Canonical Narrowing with Irreducibility Constraints as a Symbolic Protocol Analysis Method. 15-38 - Erin Hanna, Christopher Lynch, David Jaz Myers, Corey Richardson:
Finding Intruder Knowledge with Cap-Matching. 39-53 - Matteo Busi, Pierpaolo Degano, Letterio Galletta:
Robust Declassification by Incremental Typing. 54-69 - Elisavet Kozyri, Owen Arden, Andrew C. Myers, Fred B. Schneider:
JRIF: Reactive Information Flow Control for Java. 70-88 - Vivek Nigam, Carolyn L. Talcott, Abraão Aires Urquiza:
Symbolic Timed Trace Equivalence. 89-111 - David A. Basin, Lucca Hirschi, Ralf Sasse:
Symbolic Analysis of Identity-Based Protocols. 112-134 - Moses D. Liskov, Joshua D. Guttman, John D. Ramsdell, Paul D. Rowe, F. Javier Thayer:
Enrich-by-Need Protocol Analysis for Diffie-Hellman. 135-155 - Andrew William Roscoe, Lei Wang:
Key Agreement via Protocols. 156-166 - Jason Castiglione, Dusko Pavlovic, Peter-Michael Seidel:
Privacy Protocols. 167-191 - Musab A. AlTurki, Tajana Ban Kirigin, Max I. Kanovich, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott:
A Multiset Rewriting Model for Specifying and Verifying Timing Aspects of Security Protocols. 192-213 - Véronique Cortier, Pierrick Gaudry, Stéphane Glondu:
Belenios: A Simple Private and Verifiable Electronic Voting System. 214-238
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.