Found 141 Documents (Results 1–100)
Knowledge problems in security protocols: going beyond subterm convergent theories. (English) Zbl 07929345
Gaboardi, Marco (ed.) et al., 8th international conference on formal structures for computation and deduction, FSCD 2023, Rome, Italy, July 3–6, 2023. Wadern: Schloss Dagstuhl – Leibniz-Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 260, Article 30, 19 p. (2023).
Describing and animating quantum protocols. (English) Zbl 07920685
Palmigiano, Alessandra (ed.) et al., Samson Abramsky on logic and structure in computer science and beyond. Cham: Springer. Outst. Contrib. Log. 25, 447-473 (2023).
Best of both worlds. Revisiting the spymasters double agent problem. (English) Zbl 1531.94021
Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 14081, 328-359 (2023).
High performance, low energy, and trustworthy blockchains using satellites. (English) Zbl 07780439
MSC:
68M12
Augmented random oracles. (English) Zbl 1517.94168
Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13509, 35-65 (2022).
MSC:
94A60
Invited paper: Cross-chain state machine replication. (English) Zbl 1522.68072
Devismes, Stéphane (ed.) et al., Stabilization, safety, and security of distributed systems. 24th international symposium, SSS 2022, Clermont-Ferrand, France, November 15–17, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13751, 51-65 (2022).
Cryptography and network security. (English) Zbl 1510.68003
River Publishers Series in Security and Digital Forensics. Gistrup: River Publishers; London: Routledge (ISBN 978-87-7022-407-9/hbk; 978-1-003-33776-8/ebook). xiii, 293 p. (2022).
The cost of adaptivity in security games on graphs. (English) Zbl 1511.94115
Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13043, 550-581 (2021).
Environmentally friendly composable multi-party computation in the plain model from standard (timed) assumptions. (English) Zbl 1509.94072
Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13042, 750-781 (2021).
On the round complexity of black-box secure MPC. (English) Zbl 1486.94111
Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12826, 214-243 (2021).
Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions. (English) Zbl 1508.68098
Foundations for actively secure card-based cryptography. (English) Zbl 1516.94038
Farach-Colton, Martin (ed.) et al., 10th international conference on fun with algorithms. FUN 2021, May 30 – June 1, 2021, Favignana Island, Sicily, Italy. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 157, Article 17, 23 p. (2020).
Pine: enabling privacy-preserving deep packet inspection on TLS with rule-hiding and fast connection establishment. (English) Zbl 1524.68044
Chen, Liqun (ed.) et al., Computer security – ESORICS 2020. 25th European symposium on research in computer security, ESORICS 2020, Guildford, UK, September 14–18, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12308, 3-22 (2020).
On adaptive security of delayed-input sigma protocols and Fiat-Shamir NIZKs. (English) Zbl 1506.94034
Galdi, Clemente (ed.) et al., Security and cryptography for networks. 12th international conference, SCN 2020, Amalfi, Italy, September 14–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12238, 670-690 (2020).
Protocols for secure test on relationship on number axis. (Chinese. English summary) Zbl 1474.68037
Card-based protocol against actively revealing card attack. (English) Zbl 1540.68091
Martín-Vide, Carlos (ed.) et al., Theory and practice of natural computing. 8th international conference, TPNC 2019, Kingston, ON, Canada, December 9–11, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11934, 95-106 (2019).
Formalizing and proving privacy properties of voting protocols using alpha-beta privacy. (English) Zbl 1496.68136
Sako, Kazue (ed.) et al., Computer security – ESORICS 2019. 24th European symposium on research in computer security, Luxembourg, September 23–27, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11735, 535-555 (2019).
Brief announcement: Multiparty interactive communication with private channels. (English) Zbl 1543.68025
Nowak, Thomas (ed.), Proceedings of the 38th ACM symposium on principles of distributed computing, PODC ’19, Toronto, ON, Canada, July 29 – August 2, 2019. New York, NY: Association for Computing Machinery (ACM). 147-149 (2019).
An efficient and batch verifiable conditional privacy-preserving authentication scheme for VANETs using lattice. (English) Zbl 1487.68025
Extended 3-party ACCE and application to LoRaWAN 1.1. (English) Zbl 1454.94057
Buchmann, Johannes (ed.) et al., Progress in cryptology – AFRICACRYPT 2019. 11th international conference on cryptology in Africa, Rabat, Morocco, July 9–11, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11627, 21-38 (2019).
Blockchain technology: issues of analysis and synthesis. (English. Russian original) Zbl 1443.68029
Cybern. Syst. Anal. 55, No. 3, 488-495 (2019); translation from Kibern. Sist. Anal. 2019, No. 3, 164-172 (2019).
Practical and provably secure onion routing. (English) Zbl 1499.68044
Chatzigiannakis, Ioannis (ed.) et al., 45th international colloquium on automata, languages, and programming. ICALP 2018, Prague, Czech Republic, July 9–13, 2018. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 107, Article 144, 14 p. (2018).
Ephemeral-secret-leakage secure ID-based three-party authenticated key agreement protocol for mobile distributed computing environments. (English) Zbl 1423.94130
ID-based public auditing protocol for cloud storage data integrity checking with strengthened authentication and security. (English) Zbl 1424.68011
The applied pi calculus, mobile values, new names, and secure communication. (English) Zbl 1426.68037
An improved secure cloud storage auditing protocol based on distributed string equality checking. (English) Zbl 1391.68030
On minimal connectivity requirements for secure message transmission in directed networks. (English) Zbl 1423.68074
Communications and networking. 11th EAI international conference, ChinaCom 2016, Chongqing, China, September 24–26, 2016. Proceedings. Part I. (English) Zbl 1375.94010
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 209. Cham: Springer (ISBN 978-3-319-66624-2/pbk; 978-3-319-66625-9/ebook). xxii, 516 p. (2018).
On communication models when verifying equivalence properties. (English) Zbl 1444.68035
Maffei, Matteo (ed.) et al., Principles of security and trust. 6th international conference, POST 2017, held as part of the European joint conferences on theory and practice of software, ETAPS 2017, Uppsala, Sweden, April 22–29, 2017. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 10204, 141-163 (2017).
A user authentication and key agreement scheme for heterogeneous wireless sensor networks. (Chinese. English summary) Zbl 1389.68030
Intruder deducibility constraints with negation. Decidability and application to secured service compositions. (English) Zbl 1356.68012
Distributed computer and communication networks. 19th international conference, DCCN 2016, Moscow, Russia, November 21–25, 2016. Revised selected papers. (English) Zbl 1386.68012
Communications in Computer and Information Science 678. Cham: Springer (ISBN 978-3-319-51916-6/pbk; 978-3-319-51917-3/ebook). xv, 670 p. (2016).
Consensus algorithm with censored data for distributed detection with corrupted measurements: a game-theoretic approach. (English) Zbl 1448.68192
Zhu, Quanyan (ed.) et al., Decision and game theory for security. 7th international conference, GameSec 2016, New York, NY, USA, November 2–4, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9996, 455-466 (2016).
A simpler proof of the existence of quantum weak coin flipping with arbitrarily small bias. (English) Zbl 1342.81096
The hidden graph model: communication locality and optimal resiliency with adaptive faults. (English) Zbl 1365.68255
Proceedings of the 6th conference on innovations in theoretical computer science, ITCS’15, Rehovot, Israel, January 11–13, 2015. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-3333-7). 153-162 (2015).
Provably secure extended chaotic map-based three-party key agreement protocols using password authentication. (English) Zbl 1348.94076
Modeling the signaling overhead in host identity protocol-based secure mobile architectures. (English) Zbl 1456.68019
Private interactive communication across an adversarial channel. (English) Zbl 1366.68043
Proceedings of the 5th conference on innovations in theoretical computer science, ITCS’14, Princeton, NJ, USA, January 11–14, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2243-0). 135-144 (2014).
Transmission protocol for secure big data in two-hop wireless networks with cooperative jamming. (English) Zbl 1404.68022
How to withstand mobile virus attacks, revisited. (English) Zbl 1321.94036
Proceedings of the 2014 ACM symposium on principles of distributed computing, PODC ’14, Paris, France, July 15–18, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2944-6). 293-302 (2014).
Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model. (English) Zbl 1331.94060
Protocol insecurity with a finite number of sessions and a cost-sensitive guessing intruder is NP-complete. (English) Zbl 1359.94564
Strong security and privacy of RFID system for internet of things infrastructure. (English) Zbl 1355.68023
Gierlichs, Benedikt (ed.) et al., Security, privacy, and applied cryptography engineering. Third international conference, SPACE 2013, Kharagpur, India, October 19–23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41223-3/pbk). Lecture Notes in Computer Science 8204, 56-69 (2013).
A novel efficient access control scheme for large-scale distributed wireless sensor networks. (English) Zbl 1283.68089
Ciphertext retrieval in database based on RSA’s multiplicative homomorphism. (Chinese. English summary) Zbl 1289.68032
Universally composable secure computation with (malicious) physically uncloneable functions. (English) Zbl 1300.68029
Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 702-718 (2013).
Advances in network analysis and its applications. Selected papers based on the presentations at the seven workshops (2010–2012) on mathematics of networking (FP-NETS). (English) Zbl 1254.00030
Mathematics in Industry 18. Berlin: Springer (ISBN 978-3-642-30903-8/hbk; 978-3-642-30904-5/ebook). xvi, 409 p. (2013).
The knowledge tightness of parallel zero-knowledge. (English) Zbl 1296.94102
Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 512-529 (2012).
Cryptographic protocol. Security analysis based on trusted freshness. (English) Zbl 1267.68009
Berlin: Springer; Beijing: Higher Education Press (ISBN 978-3-642-24072-0; 978-7-04-031331-4/hbk). xi, 373 p. (2012).
Operational semantics and verification of security protocols. (English) Zbl 1267.68002
Information Security and Cryptography. Berlin: Springer (ISBN 978-3-540-78635-1/hbk; 978-3-540-78636-8/ebook). xiii, 172 p. (2012).
Reviewer: Jörg Desel (Hagen)
Adaptively secure broadcast, revisited. (English) Zbl 1321.94060
Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on principles of distributed computing, PODC ’11, San Jose, CA, USA, June 06–08, 2011. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-0719-2). 179-186 (2011).
Challenges for decidable epistemic logics from security protocols. (English) Zbl 1317.03023
van Benthem, Johan (ed.) et al., Games, norms and reasons. Logic at the crossroads. Dordrecht: Springer (ISBN 978-94-007-0713-9/hbk; 978-94-007-0920-1/set; 978-94-007-0714-6/ebook). Synthese Library 353, 215-231 (2011).
Deciding security properties for cryptographic protocols. application to key cycles. (English) Zbl 1351.94035
Hybrid-secure MPC, trading information-theoretic robustness for computational privacy. (English) Zbl 1315.68121
Proceedings of the 29th annual ACM SIGACT-SIGOPS symposium on principles of distributed computing, PODC ’10, Zurich, Switzerland, July 25–28, 2010. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-888-9). 219-228 (2010).
Intractable problems in cryptography. (English) Zbl 1222.94033
McGuire, Gary (ed.) et al., Finite fields. Theory and applications. Proceedings of the 9th international conference on finite fields and applications, Dublin, Ireland, July 13–17, 2009. Providence, RI: American Mathematical Society (AMS) (ISBN 978-0-8218-4786-2/pbk). Contemporary Mathematics 518, 279-300 (2010).
Reviewer: Zlatko Varbanov (Veliko Tarnovo)
ISPs and ad networks against botnet ad fraud. (English) Zbl 1298.91071
Alpcan, Tansu (ed.) et al., Decision and game theory for security. First international conference, GameSec 2010, Berlin, Germany, November 22–23, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17196-3/pbk). Lecture Notes in Computer Science 6442, 149-167 (2010).
A game-theoretic framework for specification and verification of cryptographic protocols. (English) Zbl 1211.68254
Selected topics in communication networks and distribution systems. (English) Zbl 1209.68018
Hackensack, NJ: World Scientific (ISBN 978-981-283-943-5/hbk; 978-981-283-944-2/ebook). vii, 799 p. (2010).
A privacy-aware protocol for sociometric questionnaires. (English) Zbl 1247.91167
Hlinený, Petr (ed.) et al., Annual doctoral workshop on mathematical and engineering methods in computer science (MEMICS’09). Selected papers based on the presentations at the workshop, November 13-15, 2009, Znojmo, Czech Republic. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-939897-15-6). OASIcs – OpenAccess Series in Informatics 13, 1-9, electronic only (2009).
Impersonation attacks on a mobile security protocol for end-to-end communications. (English) Zbl 1184.68233
Schmidt, Andreas U. (ed.) et al., Security and privacy in mobile information and communication systems. First international ICST conference, MoboSec 2009, Turin, Italy, June 3–5, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-04433-5/pbk; 978-3-642-04434-2/ebook). Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 17, 278-287 (2009).
Automatic verification of temporal-epistemic properties of cryptographic protocols. (English) Zbl 1186.68105
Relating state-based and process-based concurrency through linear logic (full-version). (English) Zbl 1181.68168
A proof theoretic analysis of intruder theories. (English) Zbl 1201.68051
Treinen, Ralf (ed.), Rewriting techniques and applications. 20th international conference, RTA 2009, Brasília, Brazil, June 29–July 1, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02347-7/pbk). Lecture Notes in Computer Science 5595, 103-117 (2009).
Quantum bit string commitment protocol using polarization of mesoscopic coherent states. (English) Zbl 1217.81029
Vulnerabilities analysis of RTS/CTS mechanism in 802.11 protocols. (Chinese. English summary) Zbl 1171.68352
Security and trust for wireless autonomic networks. Systems and control methods. (English) Zbl 1293.68045
Computational soundness of symbolic analysis for protocols using hash functions. (English) Zbl 1277.94026
Dima, Cătălin (ed.) et al., Proceedings of the first workshop in information and computer security (ICS 2006), Timisoara, Romania, September 30, 2006. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 186, 121-139 (2007).
MSC:
94A60
68Q05
A cross-layer security architecture for ad hoc networks. (Chinese. English summary) Zbl 1174.68317
On achieving the “best of both worlds” in secure multiparty computation. (English) Zbl 1232.68045
STOC’07. Proceedings of the 39th annual ACM symposium on theory of computing, San Diego, CA, USA, June 11–13, 2007. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-59593-631-8). 11-20 (2007).
Towards an automatic analysis of web service security. (English) Zbl 1148.68315
Konev, Boris (ed.) et al., Frontiers of combining systems. 6th international symposium, FroCoS 2007, Liverpool, UK, September 10–12, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74620-1/pbk). Lecture Notes in Computer Science 4720. Lecture Notes in Artificial Intelligence, 133-147 (2007).
Inductive proofs of computational secrecy. (English) Zbl 1477.68034
Biskup, Joachim (ed.) et al., Computer security – ESORICS 2007. 12th European symposium on research in computer security, Dresden, Germany, September 24–26, 2007. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 4734, 219-234 (2007).
Model checking Russian cards. (English) Zbl 1273.68245
Pecheur, Charles (ed.) et al., Proceedings of the 3rd workshop on model checking and artificial intelligence (MoChArt 2005), San Francisco, CA, USA, August 27, 2005. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 149, No. 2, 105-123 (2006).
Relating two standard notions of secrecy. (English) Zbl 1247.94030
Autexier, Serge (ed.) et al., Workshop on trustworthy software. Selected papers based on the presentations at the workshop, May 18–19, 2006, Saarbrücken, Germany. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-939897-02-6). OASIcs – OpenAccess Series in Informatics 3, 29 p., electronic only (2006).
Secure data synchronization exchange service application program interface based on SyncML protocol. (English) Zbl 1173.68376
Return address randomization scheme for annuling data-injection buffer overflow attacks. (English) Zbl 1172.68345
Lipmaa, Helger (ed.) et al., Information security and cryptology. Second SKLOIS conference, Inscrypt 2006, Beijing, China, November 29–December 1, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49608-3/pbk). Lecture Notes in Computer Science 4318, 238-252 (2006).
Packet marking based cooperative attack response service for effectively handling suspicious traffic. (English) Zbl 1172.68344
Lipmaa, Helger (ed.) et al., Information security and cryptology. Second SKLOIS conference, Inscrypt 2006, Beijing, China, November 29–December 1, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49608-3/pbk). Lecture Notes in Computer Science 4318, 182-195 (2006).
Tabu marking scheme to speedup IP traceback. (English) Zbl 1103.68371
MSC:
68M12
Filter Results by …
Document Type
- Journal Articles (64)
- Collection Articles (56)
- Books (21)
all
top 5
Author
- Cortier, Véronique (4)
- Dolev, Danny (3)
- Ostrovsky, Rafail (3)
- Pujolle, Guy (3)
- Rusinowitch, Michaël (3)
- Abadi, Martín (2)
- Canetti, Ran (2)
- Chevalier, Yannick (2)
- Christianson, Bruce (2)
- Crispo, Bruno (2)
- Davida, George I. (2)
- Delaune, Stéphanie (2)
- Even, Shimon (2)
- Garay, Juan A. (2)
- Goré, Rajeev Prabhakar (2)
- Hubaux, Jean-Pierre (2)
- Katz, Jonathan N. (2)
- Lomas, Mark (2)
- Lomuscio, Alessio (2)
- Manshaei, Mohammad Hossein (2)
- Maurer, Ueli M. (2)
- Miyahara, Daiki (2)
- Mizuki, Takaaki (2)
- Novotný, Marián (2)
- Raya, Maxim (2)
- Roe, Michael (2)
- Sahai, Amit (2)
- Saia, Jared (2)
- Ščedrov, Andrej (2)
- Sone, Hideaki (2)
- Suresh, S. P. (2)
- Takashima, Ken (2)
- Tiu, Alwen Fernanto (2)
- Viganò, Luca (2)
- Wadia, Akshay (2)
- Wang, Baocang (2)
- Zălinescu, Eugen (2)
- Zhang, Jindan (2)
- Acharya, Anasuya (1)
- Adão, Pedro (1)
- Aggarwal, Abhinav (1)
- Aharonov, Dorit (1)
- Al Agha, Khaldoun (1)
- Al-Naamany, Ahmed M. (1)
- An, Gaeil (1)
- Anders, Jutta F. (1)
- Ando, Megumi (1)
- Applebaum, Benny (1)
- Aspinall, David (1)
- Avanesov, Tigran (1)
- Babel, Kushal (1)
- Ban Kirigin, Tajana (1)
- Baras, John S. (1)
- Barni, Mauro (1)
- Baron, Joshua (1)
- Basin, David A. (1)
- Bazzi, Rida A. (1)
- Belding-Royer, Elizabeth M. (1)
- Ben Rajeb, Narjes (1)
- Benerecetti, Massimo (1)
- Berrima, Mouhebeddine (1)
- Beutelspacher, Albrecht (1)
- Bilogrevic, Igor (1)
- Biswas, G. P. (1)
- Blanchet, Bruno (1)
- Blin, Lélia (1)
- Bonneau, Joseph (1)
- Borgonovo, Flaminio (1)
- Bornat, Richard (1)
- Bourdoucen, Hadj (1)
- Boureanu, Ioana (1)
- Boyd, Colin A. (1)
- Broadnax, Brandon (1)
- Bultel, Xavier (1)
- Cachin, Christian (1)
- Caleiro, Carlos (1)
- Canard, Sébastien (1)
- Cao, Li (1)
- Carlucci Aiello, Luigia (1)
- Cervesato, Iliano (1)
- Chailloux, André (1)
- Chandran, Nishanth (1)
- Chang, Ting-Yi (1)
- Chang, Yan (1)
- Chatterjee, Santanu (1)
- Chen, Kefei (1)
- Chen, Qianbin (1)
- Chen, Wei (1)
- Chen, Yu (1)
- Chen, Zhiwei (1)
- Cheval, Vincent (1)
- Chevalier, Céline (1)
- Chongchitmate, Wutichai (1)
- Choudhury, Tanmay (1)
- Chung, Kai-Min (1)
- Ciampi, Michele (1)
- Civino, Roberto (1)
- Coffey, Tom (1)
- Cohen, Mika (1)
- Colon, Rafael (1)
- and 262 more Authors
all
top 5
Serial
- Theor. Comput. Sci. (6)
- IFIP, Int. Fed. Inf. Process. (4)
- Lect. Notes Comput. Sci. (3)
- Adv. Math. Commun. (3)
- IEEE Trans. Inf. Theory (2)
- Inf. Comput. (2)
- Formal Asp. Comput. (2)
- Nonlinear Dyn. (2)
- Fundam. Inform. (2)
- Comput. Netw. (2)
- ACM Trans. Comput. Log. (2)
- Comput. Math. Appl. (1)
- Inf. Process. Lett. (1)
- Phys. Lett., A (1)
- BIT (1)
- Computing (1)
- Inf. Control (1)
- Inf. Sci. (1)
- SIAM J. Comput. (1)
- Synthese (1)
- J. Symb. Comput. (1)
- Algorithmica (1)
- J. Autom. Reasoning (1)
- J. Cryptology (1)
- J. Parallel Distrib. Comput. (1)
- Int. J. Found. Comput. Sci. (1)
- Distrib. Comput. (1)
- Cybern. Syst. Anal. (1)
- Tatra Mt. Math. Publ. (1)
- Form. Methods Syst. Des. (1)
- J. Appl. Non-Class. Log. (1)
- Trans. Nanjing Univ. Aeronaut. Astronaut. (1)
- Obozr. Prikl. Prom. Mat. (1)
- Eur. J. Control (1)
- Soft Comput. (1)
- J. ACM (1)
- Wuhan Univ. J. Nat. Sci. (1)
- J. Shaanxi Norm. Univ., Nat. Sci. Ed. (1)
- J. Harbin Eng. Univ. (1)
- Comput. Inform. (1)
- Nat. Comput. (1)
- J. Softw. (1)
- J. Univ. Electron. Sci. Technol. China (1)
- J. Electr. Eng. (1)
- J. Ind. Manag. Optim. (1)
- Proc. Symp. Appl. Math. (1)
- Math. Ind. (1)
- Log. Methods Comput. Sci. (1)
- Found. Trends Netw. (1)
- Commun. Comput. Inf. Sci. (1)
- J. Comput. Appl. (1)
- Lect. Notes Comput. Sci. Soc.-Inform. Telecommun. Eng. (1)
- RAIRO, Theor. Inform. Appl. (1)
- Symmetry (1)
- J. Appl. Math. Comput. Mech. (1)
- Inf. Secur. Cryptogr. (1)
- River Publ. Ser. Secur. Digit. Forensics (1)
all
top 5
Year of Publication
- 2024 (1)
- 2023 (6)
- 2022 (4)
- 2021 (5)
- 2020 (6)
- 2019 (7)
- 2018 (8)
- 2017 (3)
- 2016 (4)
- 2015 (3)
- 2014 (6)
- 2013 (5)
- 2012 (3)
- 2011 (5)
- 2010 (9)
- 2009 (6)
- 2008 (4)
- 2007 (6)
- 2006 (10)
- 2005 (5)
- 2004 (3)
- 2003 (3)
- 2002 (3)
- 2001 (4)
- 2000 (4)
- 1998 (3)
- 1997 (1)
- 1996 (2)
- 1993 (1)
- 1992 (1)
- 1991 (3)
- 1989 (1)
- 1986 (1)
- 1983 (3)
- 1982 (1)
- 1978 (1)
all
top 3
Software
- AVISPA (10)
- Casper (4)
- CMQV+ (3)
- HERMES (2)
- LDYIS (2)
- MCMAS-X (2)
- OFMC (2)
- YAPA (2)
- Akiss (1)
- Apte (1)
- Archive Formal Proofs (1)
- BLISS (1)
- CCSTM (1)
- Chord (1)
- CoSP (1)
- CryptHOL (1)
- EasyCrypt (1)
- EasyUC (1)
- Freshml (1)
- GitHub (1)
- Isabelle/HOL (1)
- Isabelle/ZF (1)
- KEM-DEM (1)
- Ligero (1)
- Lolli (1)
- MCMAS (1)
- Maude (1)
- Miranda (1)
- NADA (1)
- NRL (1)
- NTRU (1)
- Paxos (1)
- Pict (1)
- ProVerif (1)
- QPL (1)
- SageMath (1)
- TAMARIN (1)
- TAPS (1)
- TulaFale (1)
- VerICS (1)
- ZKBoo (1)
- ns-2 (1)
- simpleAPL (1)