Published in: Dagstuhl Reports, Volume 9, Issue 1 (2019)
Jan Camenisch, Ralf Küsters, Anna Lysyanskaya, and Alessandra Scafuro. Practical Yet Composably Secure Cryptographic Protocols (Dagstuhl Seminar 19042). In Dagstuhl Reports, Volume 9, Issue 1, pp. 88-103, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2019)
@Article{camenisch_et_al:DagRep.9.1.88,
author = {Camenisch, Jan and K\"{u}sters, Ralf and Lysyanskaya, Anna and Scafuro, Alessandra},
title = {{Practical Yet Composably Secure Cryptographic Protocols (Dagstuhl Seminar 19042)}},
pages = {88--103},
journal = {Dagstuhl Reports},
ISSN = {2192-5283},
year = {2019},
volume = {9},
number = {1},
editor = {Camenisch, Jan and K\"{u}sters, Ralf and Lysyanskaya, Anna and Scafuro, Alessandra},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.9.1.88},
URN = {urn:nbn:de:0030-drops-105710},
doi = {10.4230/DagRep.9.1.88},
annote = {Keywords: applied cryptography, cryptographic protocols, practical protocols, provably secure protocols, security models, universally composability}
}
Published in: Dagstuhl Reports, Volume 1, Issue 8 (2011)
Hubert Comom-Lundh, Ralf Küsters, and Catherine Meadows. Security and Rewriting (Dagstuhl Seminar 11332). In Dagstuhl Reports, Volume 1, Issue 8, pp. 53-66, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2011)
@Article{comomlundh_et_al:DagRep.1.8.53,
author = {Comom-Lundh, Hubert and K\"{u}sters, Ralf and Meadows, Catherine},
title = {{Security and Rewriting (Dagstuhl Seminar 11332)}},
pages = {53--66},
journal = {Dagstuhl Reports},
ISSN = {2192-5283},
year = {2011},
volume = {1},
number = {8},
editor = {Comom-Lundh, Hubert and K\"{u}sters, Ralf and Meadows, Catherine},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.1.8.53},
URN = {urn:nbn:de:0030-drops-33111},
doi = {10.4230/DagRep.1.8.53},
annote = {Keywords: Rewriting, Security, Access Control, Protocol Verification}
}