A type system for privacy properties
Mature push button tools have emerged for checking trace properties (eg secrecy or
authentication) of security protocols. The case of indistinguishability-based privacy …
authentication) of security protocols. The case of indistinguishability-based privacy …
ILC: a calculus for composable, computational cryptography
The universal composability (UC) framework is the established standard for analyzing
cryptographic protocols in a modular way, such that security is preserved under concurrent …
cryptographic protocols in a modular way, such that security is preserved under concurrent …
[PDF][PDF] Equivalence properties by ty** in cryptographic branching protocols
V Cortier, N Grimm, J Lallemand… - … 2018, Held as Part of the …, 2018 - library.oapen.org
Recently, many tools have been proposed for automatically analysing, in symbolic models,
equivalence of security protocols. Equivalence is a property needed to state privacy …
equivalence of security protocols. Equivalence is a property needed to state privacy …
[PDF][PDF] Equivalence Properties by Ty** in Cryptographic Branching Protocols
M Maffei - Principles of Security and Trust LNCS 10804 - dlib.hust.edu.vn
Recently, many tools have been proposed for automatically analysing, in symbolic models,
equivalence of security protocols. Equivalence is a property needed to state privacy …
equivalence of security protocols. Equivalence is a property needed to state privacy …
A Framework for Resource Dependent EDSLs in a Dependently Typed Language (Pearl)
Idris' Effects library demonstrates how to embed resource dependent algebraic effect
handlers into a dependently typed host language, providing run-time and compile-time …
handlers into a dependently typed host language, providing run-time and compile-time …
[PDF][PDF] Analysis of security protocols in embedded systems
A Bruni - 2016 - orbit.dtu.dk
Analysis of Security Protocols in[1ex] Embedded Systems Page 1 General rights Copyright
and moral rights for the publications made accessible in the public portal are retained by the …
and moral rights for the publications made accessible in the public portal are retained by the …
A theory of types for security and privacy
FS Eigner - 2015 - publikationen.sulb.uni-saarland.de
Cryptographic protocols are ubiquitous in the modern web. However, they are notoriously
difficult to design and their manual security analysis is both tedious and error-prone. Due to …
difficult to design and their manual security analysis is both tedious and error-prone. Due to …
[PDF][PDF] A Complete Bibliography of Publications in ACM Transactions on Programming Languages and Systems (TOPLAS)
P Briggs, NHF Beebe - 2024 - netlib.org
Abstract [BGL93, BK11, CMB+95, CFG+97, DGG97, DC22, DHH+24, DLR16, ELS+14,
EO80, GS98, GMP24a, HL82, JPP91, KRR18, Lan80, LO94, LV94, LM18, LR13, Loe87 …
EO80, GS98, GMP24a, HL82, JPP91, KRR18, Lan80, LO94, LV94, LM18, LR13, Loe87 …