Computational probabilistic noninterference
- 1 October 2004
- journal article
- Published by Springer Nature in International Journal of Information Security
- Vol. 3 (1) , 42-60
- https://doi.org/10.1007/s10207-004-0039-7
Abstract
No abstract availableKeywords
This publication has 61 references indexed in Scilit:
- Intransitive non-interference for cryptographic purposesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- A composable cryptographic library with nested operationsPublished by Association for Computing Machinery (ACM) ,2003
- Polynomial fairness and livenessPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Deriving Cryptographically Sound Implementations Using Composition and Formally Verified BisimulationPublished by Springer Nature ,2002
- Secrecy Types for Asymmetric CommunicationPublished by Springer Nature ,2001
- Security and Composition of Multiparty Cryptographic ProtocolsJournal of Cryptology, 2000
- A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract)Published by Association for Computing Machinery (ACM) ,1998
- Relations among notions of security for public-key encryption schemesPublished by Springer Nature ,1998
- Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minorityJournal of Cryptology, 1991
- Secure Computer System: Unified Exposition and Multics InterpretationPublished by Defense Technical Information Center (DTIC) ,1976