Group Principals and the Formalization of Anonymity
- 17 September 1999
- book chapter
- Published by Springer Nature
- p. 814-833
- https://doi.org/10.1007/3-540-48119-2_45
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- A different look at secure distributed computationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- The epistemic representation of information flow security in probabilistic systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Protocols using anonymous connections: Mobile applicationsPublished by Springer Nature ,1998
- CSP and anonymityPublished by Springer Nature ,1996
- A logic for reasoning about securityACM Transactions on Computer Systems, 1992
- A Logical View of Secure Dependencies*Journal of Computer Security, 1992
- How to withstand mobile virus attacks (extended abstract)Published by Association for Computing Machinery (ACM) ,1991
- A logic of authenticationPublished by Association for Computing Machinery (ACM) ,1989
- Security Policies and Security ModelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- Modal LogicPublished by Cambridge University Press (CUP) ,1980