首页 > 最新文献

Joint Workshop on Theory of Security and Applications最新文献

英文 中文
Formal Analysis of the EMV Protocol Suite EMV协议套件的形式化分析
Pub Date : 2011-03-31 DOI: 10.1007/978-3-642-27375-9_7
Joeri de Ruiter, E. Poll
{"title":"Formal Analysis of the EMV Protocol Suite","authors":"Joeri de Ruiter, E. Poll","doi":"10.1007/978-3-642-27375-9_7","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_7","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122611286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
Multiple Congruence Relations, First-Order Theories on Terms, and the Frames of the Applied Pi-Calculus 多重同余关系,项的一阶理论,以及应用pi微积分的框架
Pub Date : 2011-03-31 DOI: 10.1007/978-3-642-27375-9_10
Florent Jacquemard, É. Lozes, R. Treinen, Jules Villard
{"title":"Multiple Congruence Relations, First-Order Theories on Terms, and the Frames of the Applied Pi-Calculus","authors":"Florent Jacquemard, É. Lozes, R. Treinen, Jules Villard","doi":"10.1007/978-3-642-27375-9_10","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_10","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114165550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Model-Checking Secure Information Flow for Multi-threaded Programs 多线程程序安全信息流的模型检查
Pub Date : 2011-03-31 DOI: 10.1007/978-3-642-27375-9_9
M. Huisman, Henri-Charles Blondeel
{"title":"Model-Checking Secure Information Flow for Multi-threaded Programs","authors":"M. Huisman, Henri-Charles Blondeel","doi":"10.1007/978-3-642-27375-9_9","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_9","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114433123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Constructive Cryptography - A New Paradigm for Security Definitions and Proofs 构造密码学——安全定义和证明的新范式
Pub Date : 2011-03-31 DOI: 10.1007/978-3-642-27375-9_3
U. Maurer
{"title":"Constructive Cryptography - A New Paradigm for Security Definitions and Proofs","authors":"U. Maurer","doi":"10.1007/978-3-642-27375-9_3","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_3","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128140451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 161
Automated Code Injection Prevention for Web Applications Web应用程序的自动代码注入预防
Pub Date : 2011-03-31 DOI: 10.1007/978-3-642-27375-9_11
Zhengqin Luo, Tamara Rezk, M. Serrano
{"title":"Automated Code Injection Prevention for Web Applications","authors":"Zhengqin Luo, Tamara Rezk, M. Serrano","doi":"10.1007/978-3-642-27375-9_11","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_11","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125325782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
G2C: Cryptographic Protocols from Goal-Driven Specifications G2C:来自目标驱动规范的加密协议
Pub Date : 2011-03-31 DOI: 10.1007/978-3-642-27375-9_4
M. Backes, Matteo Maffei, Kim Pecina, Raphael M. Reischuk
{"title":"G2C: Cryptographic Protocols from Goal-Driven Specifications","authors":"M. Backes, Matteo Maffei, Kim Pecina, Raphael M. Reischuk","doi":"10.1007/978-3-642-27375-9_4","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_4","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"134 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116578758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Union and Intersection Types for Secure Protocol Implementations 安全协议实现的并集和交集类型
Pub Date : 2011-03-31 DOI: 10.1007/978-3-642-27375-9_1
M. Backes, Catalin Hritcu, Matteo Maffei
{"title":"Union and Intersection Types for Secure Protocol Implementations","authors":"M. Backes, Catalin Hritcu, Matteo Maffei","doi":"10.1007/978-3-642-27375-9_1","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_1","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134590771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Modeling Long-Term Signature Validation for Resolution of Dispute 为解决争议建立长期签名验证模型
Pub Date : 2011-03-31 DOI: 10.1007/978-3-642-27375-9_5
Moez Ben MBarka, F. Krief, Olivier Ly
{"title":"Modeling Long-Term Signature Validation for Resolution of Dispute","authors":"Moez Ben MBarka, F. Krief, Olivier Ly","doi":"10.1007/978-3-642-27375-9_5","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_5","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116136904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Soundness of Removing Cancellation Identities in Protocol Analysis under Exclusive-OR 异或条件下协议分析中去除抵消身份的合理性
Pub Date : 2011-03-31 DOI: 10.1007/978-3-642-27375-9_12
S. Malladi
{"title":"Soundness of Removing Cancellation Identities in Protocol Analysis under Exclusive-OR","authors":"S. Malladi","doi":"10.1007/978-3-642-27375-9_12","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_12","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132498645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure Composition of Protocols 协议的安全组合
Pub Date : 2011-03-31 DOI: 10.1007/978-3-642-27375-9_2
V. Cortier
{"title":"Secure Composition of Protocols","authors":"V. Cortier","doi":"10.1007/978-3-642-27375-9_2","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_2","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132680707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
Joint Workshop on Theory of Security and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1