Composition and integrity preservation of secure reactive systems
- 1 November 2000
- proceedings article
- Published by Association for Computing Machinery (ACM)
- p. 245-254
- https://doi.org/10.1145/352600.352639
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- Using narrowing in the analysis of key management protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Player Simulation and General Adversary Structures in Perfect Multiparty ComputationJournal of Cryptology, 2000
- A probabilistic poly-time framework for protocol analysisPublished by Association for Computing Machinery (ACM) ,1998
- A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract)Published by Association for Computing Machinery (ACM) ,1998
- A calculus for cryptographic protocolsPublished by Association for Computing Machinery (ACM) ,1997
- Sorting out signature schemesPublished by Association for Computing Machinery (ACM) ,1993
- Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minorityJournal of Cryptology, 1991
- The Knowledge Complexity of Interactive Proof SystemsSIAM Journal on Computing, 1989
- How to play ANY mental gamePublished by Association for Computing Machinery (ACM) ,1987