Search

Your search keyword '"Proof techniques for security protocols (PESTO)"' showing total 190 results

Search Constraints

Start Over You searched for: Author "Proof techniques for security protocols (PESTO)" Remove constraint Author: "Proof techniques for security protocols (PESTO)"
190 results on '"Proof techniques for security protocols (PESTO)"'

Search Results

1. A formal analysis of the Neuchâtel e-voting protocol

2. Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses

3. A comprehensive, formal and automated analysis of the EDHOC protocol

4. Inferring RPO Symbol Ordering

5. Polite Combination of Algebraic Datatypes

6. Tamarin: Verification of Large-Scale, Real-World, Cryptographic Protocols

7. Is the JCJ voting system really coercion-resistant?

8. Belenios with cast as intended

9. Typing High-Speed Cryptography against Spectre v1

10. Privacy Preserving Recommendations for Social Networks

11. Reversing, Breaking, and Fixing the French Legislative Election E-Voting Protocol

12. Verifiable Decryption in the Head

13. Themis

14. Enforcing Fine-grained Constant-time Policies

15. Features and usage of Belenios in 2022

16. Time, Privacy, Robustness, Accuracy: Trade-Offs for the Open Vote Network Protocol

17. Automatic generation of sources lemmas in TAMARIN: towards automatic proofs of security protocols

18. Graph-Embedded Term Rewrite Systems and Applications (A Preliminary Report)

19. Sapic+ : protocol verifiers of the world, unite!

20. A small bound on the number of sessions for security protocols

21. An Extensive Formal Analysis of Multi-factor Authentication Protocols

22. A Decidable Class of Security Protocols for Both Reachability and Equivalence Properties

23. Inferring attributes with picture metadata embeddings

24. Le vote électronique - les défis du secret et de la transparence

25. Proving Unlinkability using ProVerif through Desynchronized Bi-Processes

26. A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols

27. Automatically Distributing and Updating In-Network Management Rules for Software Defined Networks

28. Attribute inference attacks on social media publications

29. Differentially Private Friends Recommendation

30. On Privacy of Multidimensional Data Against Aggregate Knowledge Attacks

31. Combined Hierarchical Matching: the Regular Case

32. Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co

33. Symbolic protocol verification with dice: process equivalences in the presence of probabilities (extended version)

34. Efficient Rules Management Algorithms in Software Defined Networking

35. A privacy attack on the Swiss Post e-voting system

36. Structured Leakage and Applications to Cryptographic Constant-Time and Cost

37. Verifying Table-Based Elections

38. FAIRiser vos données : mémorandum

39. Implementing Security Protocol Monitors

40. Formal verification of a constant-time preserving C compiler

41. New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols

42. Politeness for the Theory of Algebraic Datatypes (Extended Abstract)

43. Politeness and Stable Infiniteness: Stronger Together

44. Fixing the Achilles Heel of E-Voting: The Bulletin Board

45. A toolbox for verifiable tally-hiding e-voting systems

46. Vérification efficace d'équivalences observationnelles de processus cryptographiques : théorie et pratique

47. Les livraisons dangereuses

48. FOX: Fooling with Explanations Privacy Protection with Adversarial Reactions in Social Media

49. How to explain security protocols to your children

50. Divide-and-Learn: A Random Indexing Approach to Attribute Inference Attacks in Online Social Networks

Catalog

Books, media, physical & digital resources