Information Technology Reference
In-Depth Information
7. Canetti, R.: Universally composable security: a new paradigm for cryptographic
protocols. In IEEE, editor, 42nd IEEE Symposium on Foundations of Computer
Science: proceedings: October 14-17, 2001, Las Vegas, Nevada, USA , 1109 Spring
Street, Suite 300, Silver Spring, MD 20910, USA. IEEE Computer Society Press
(2001) 136-145
8. Comon, H. and Cortier, V.: Tree automata with one memory, set constraints and
cryptographic protocols. Theoretical Computer Science (2003) To appear
9. Comon, H., Cortier, V., and Mitchell, J.: Tree automata with one memory, set
constraints, and ping-pong protocols. In Proc. of the Intern. Conf. on Automata,
languages and Programming (ICALP'01, ) Lect. Notes in Comput. Sci., vol. 2076
(2001) 682-693
10. Comon, H. and Shmatikov, V.: Is it possible to decide whether a cryptographic
protocol is secure or not?, (2002) Draft. 10 pages. Available at
http://www.lsv.ens-cachan.fr/
11. Dolev, D., Even, S., and Karp, R.: On the security of ping-pong protocols. Infor-
mation and Control , 55 (1982) 57-68
12. Durgin, N., Lincoln, P., Mitchell, J.C., and Scedrov, A.: Undecidability of bounded
security protocols. In Proc. of the Workshop on Formal Methods and Security
Protocols, Trento, Italy (1999)
13. Fournet, C. and Gordon, A.D.: Stack inspection: Theory and variants. ACM
Transactions on Programming Languages and Systems , 25(3) (May 2003) 360-399
14. Gorodetski, V. and Kotenko, I.: Attacks against computer network: Formal
grammar-based framework and simulation tool. Lecture Notes in Computer Sci-
ence , 2516 (2002) 219-238
15. Goldreich, O.: Foundations of Cryptography: Basic Tools . Cambridge University
Press, Cambridge, UK, 2001. Parts of volumes 2 and 3 (drafts of Chapers 5-7) can
be found at http://www.wisdom.weizman.ac.il/ oded/
16. Hunter, J.: An information security handbook . Springer (2001)
17. Katz, J. and Yung, M.: Complete characterization of security notions for proba-
bilistic private-key encryption. In Proceedings of the ACM Symposium on Theory
of Computing , ACM Press (2000) 245-254
18. Lincoln, P., Mitchell, J., Mitchell, M., and Scedrov, V.: A probabilistic poly-time
framework for protocol analysis. In Proceedings of the 5th ACM Conference on
Computer and Communications Security , San Francisco, California, ACM Press
(November 1998) 112-121
19. Necula, G.C.: Proof-carrying code. In Proceedings of the 24th ACM Symposium
on Principles of Programming Languages , Paris, France (January 1997)
20. Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Jour-
nal of Computer Security , 6(1) (1998) 85-128
21. Rusinovich, M. and Turuani, M.: Protocol insecurity with finite number of sessions
is NP-complete. In Proc. of the 14th Computer Security Foundations Workshop
(CSFW'01) . IEEE Computer Society Press (2001) 174-190
22. Schneider, F.B.: Enforceable security policies. ACM Transactions on Information
and System Security , 3(1) (February 2000) 30-50
23. Schneier, B.: Secrets & Lies — Digital Security in a Networked World . John Wiley
& Sons (2000)
24. Sheyner, O., Jha, S., Wing, J., Lippmann, R., and Haines, J.: Automated gener-
ation and analysis of attack graphs. In Proceedings of the IEEE Symposium on
Research in Security and Privacy , Oakland, CA, May 2002. IEEE Computer Soci-
ety, Technical Committee on Security and Privacy, IEEE Computer Society Press,
273-284
Search WWH ::




Custom Search