


default search action
Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows, 2019
- Joshua D. Guttman, Carl E. Landwehr, José Meseguer, Dusko Pavlovic

:
Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows. Lecture Notes in Computer Science 11565, Springer 2019, ISBN 978-3-030-19051-4 - Sylvan Pinsky:

Cathy Meadows: A Central Figure in Protocol Analysis. 1-5 - Jonathan K. Millen

:
A Long, Slow Conversation. 6-7 - Paul Syverson:

Key Reminiscences. 8-14 - Santiago Escobar

, José Meseguer:
Canonical Narrowing with Irreducibility Constraints as a Symbolic Protocol Analysis Method. 15-38 - Erin Hanna, Christopher Lynch

, David Jaz Myers, Corey Richardson:
Finding Intruder Knowledge with Cap-Matching. 39-53 - Matteo Busi

, Pierpaolo Degano
, Letterio Galletta
:
Robust Declassification by Incremental Typing. 54-69 - Elisavet Kozyri, Owen Arden, Andrew C. Myers, Fred B. Schneider:

JRIF: Reactive Information Flow Control for Java. 70-88 - Vivek Nigam, Carolyn L. Talcott, Abraão Aires Urquiza:

Symbolic Timed Trace Equivalence. 89-111 - David A. Basin, Lucca Hirschi, Ralf Sasse:

Symbolic Analysis of Identity-Based Protocols. 112-134 - Moses D. Liskov, Joshua D. Guttman, John D. Ramsdell, Paul D. Rowe, F. Javier Thayer:

Enrich-by-Need Protocol Analysis for Diffie-Hellman. 135-155 - Andrew William Roscoe, Lei Wang:

Key Agreement via Protocols. 156-166 - Jason Castiglione, Dusko Pavlovic, Peter-Michael Seidel:

Privacy Protocols. 167-191 - Musab A. AlTurki, Tajana Ban Kirigin

, Max I. Kanovich, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott:
A Multiset Rewriting Model for Specifying and Verifying Timing Aspects of Security Protocols. 192-213 - Véronique Cortier, Pierrick Gaudry, Stéphane Glondu

:
Belenios: A Simple Private and Verifiable Electronic Voting System. 214-238

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














