Cryptographically-Masked Flows
- 1 January 2006
- book chapter
- Published by Springer Nature
- p. 353-369
- https://doi.org/10.1007/11823230_23
Abstract
No abstract availableKeywords
This publication has 32 references indexed in Scilit:
- Security-Typed Languages for Implementation of Cryptographic Protocols: A Case StudyPublished by Springer Nature ,2005
- Security policies for downgradingPublished by Association for Computing Machinery (ACM) ,2004
- Type-based distributed access controlPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Encryption-Scheme Security in the Presence of Key-Dependent MessagesPublished by Springer Nature ,2003
- Confidentiality for mobile code: the case of a simple payment protocolPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)*Journal of Cryptology, 2002
- Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition ParadigmPublished by Springer Nature ,2000
- Secrecy by typing in security protocolsJournal of the ACM, 1999
- Relations among notions of security for public-key encryption schemesPublished by Springer Nature ,1998
- A logic of authenticationACM Transactions on Computer Systems, 1990