|
Conferences in DBLP
(psec) 2009 (conf/psec/2009)
Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables. [Citation Graph (, )][DBLP]
Validating Integrity for the Ephemerizer's Protocol with CL-Atse. [Citation Graph (, )][DBLP]
Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols. [Citation Graph (, )][DBLP]
Fake Fingers in Fingerprint Recognition: Glycerin Supersedes Gelatin. [Citation Graph (, )][DBLP]
Comparing State Spaces in Automatic Security Protocol Analysis. [Citation Graph (, )][DBLP]
Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures. [Citation Graph (, )][DBLP]
Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment. [Citation Graph (, )][DBLP]
New Anonymity Notions for Identity-Based Encryption. [Citation Graph (, )][DBLP]
Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption. [Citation Graph (, )][DBLP]
Writing an OS Kernel in a Strictly and Statically Typed Language. [Citation Graph (, )][DBLP]
|