Published in: Dagstuhl Reports, Volume 9, Issue 1 (2019)
Jan Camenisch, Ralf Küsters, Anna Lysyanskaya, and Alessandra Scafuro. Practical Yet Composably Secure Cryptographic Protocols (Dagstuhl Seminar 19042). In Dagstuhl Reports, Volume 9, Issue 1, pp. 88-103, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2019)
@Article{camenisch_et_al:DagRep.9.1.88, author = {Camenisch, Jan and K\"{u}sters, Ralf and Lysyanskaya, Anna and Scafuro, Alessandra}, title = {{Practical Yet Composably Secure Cryptographic Protocols (Dagstuhl Seminar 19042)}}, pages = {88--103}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2019}, volume = {9}, number = {1}, editor = {Camenisch, Jan and K\"{u}sters, Ralf and Lysyanskaya, Anna and Scafuro, Alessandra}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.9.1.88}, URN = {urn:nbn:de:0030-drops-105710}, doi = {10.4230/DagRep.9.1.88}, annote = {Keywords: applied cryptography, cryptographic protocols, practical protocols, provably secure protocols, security models, universally composability} }
Published in: Dagstuhl Reports, Volume 1, Issue 8 (2011)
Hubert Comom-Lundh, Ralf Küsters, and Catherine Meadows. Security and Rewriting (Dagstuhl Seminar 11332). In Dagstuhl Reports, Volume 1, Issue 8, pp. 53-66, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2011)
@Article{comomlundh_et_al:DagRep.1.8.53, author = {Comom-Lundh, Hubert and K\"{u}sters, Ralf and Meadows, Catherine}, title = {{Security and Rewriting (Dagstuhl Seminar 11332)}}, pages = {53--66}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2011}, volume = {1}, number = {8}, editor = {Comom-Lundh, Hubert and K\"{u}sters, Ralf and Meadows, Catherine}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.1.8.53}, URN = {urn:nbn:de:0030-drops-33111}, doi = {10.4230/DagRep.1.8.53}, annote = {Keywords: Rewriting, Security, Access Control, Protocol Verification} }
Feedback for Dagstuhl Publishing