Intransitive non-interference for cryptographic purposes
- 13 May 2004
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableThis publication has 17 references indexed in Scilit:
- Robust declassificationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- A general theory of security propertiesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A network version of the PumpPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Secure introduction of one-way functionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Protecting privacy using the decentralized label modelACM Transactions on Software Engineering and Methodology, 2000
- Information flow in nondeterministic systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- Covert Channel CapacityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- Unwinding and Inference ControlPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1984
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983
- Protocols for secure computationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982