A type system for privacy properties

V Cortier, N Grimm, J Lallemand, M Maffei - Proceedings of the 2017 …, 2017 - dl.acm.org
Mature push button tools have emerged for checking trace properties (eg secrecy or
authentication) of security protocols. The case of indistinguishability-based privacy …

ILC: a calculus for composable, computational cryptography

K Liao, MA Hammer, A Miller - Proceedings of the 40th ACM SIGPLAN …, 2019 - dl.acm.org
The universal composability (UC) framework is the established standard for analyzing
cryptographic protocols in a modular way, such that security is preserved under concurrent …

[PDF][PDF] Equivalence properties by ty** in cryptographic branching protocols

V Cortier, N Grimm, J Lallemand… - … 2018, Held as Part of the …, 2018 - library.oapen.org
Recently, many tools have been proposed for automatically analysing, in symbolic models,
equivalence of security protocols. Equivalence is a property needed to state privacy …

[PDF][PDF] Equivalence Properties by Ty** in Cryptographic Branching Protocols

M Maffei - Principles of Security and Trust LNCS 10804 - dlib.hust.edu.vn
Recently, many tools have been proposed for automatically analysing, in symbolic models,
equivalence of security protocols. Equivalence is a property needed to state privacy …

A Framework for Resource Dependent EDSLs in a Dependently Typed Language (Pearl)

J de Muijnck-Hughes, E Brady, W Vanderbauwhede - 2020 - eprints.gla.ac.uk
Idris' Effects library demonstrates how to embed resource dependent algebraic effect
handlers into a dependently typed host language, providing run-time and compile-time …

[PDF][PDF] Analysis of security protocols in embedded systems

A Bruni - 2016 - orbit.dtu.dk
Analysis of Security Protocols in[1ex] Embedded Systems Page 1 General rights Copyright
and moral rights for the publications made accessible in the public portal are retained by the …

A theory of types for security and privacy

FS Eigner - 2015 - publikationen.sulb.uni-saarland.de
Cryptographic protocols are ubiquitous in the modern web. However, they are notoriously
difficult to design and their manual security analysis is both tedious and error-prone. Due to …

[PDF][PDF] A Complete Bibliography of Publications in ACM Transactions on Programming Languages and Systems (TOPLAS)

P Briggs, NHF Beebe - 2024 - netlib.org
Abstract [BGL93, BK11, CMB+95, CFG+97, DGG97, DC22, DHH+24, DLR16, ELS+14,
EO80, GS98, GMP24a, HL82, JPP91, KRR18, Lan80, LO94, LV94, LM18, LR13, Loe87 …