The Layered Games Framework for Specifications and Analysis of Security Protocols
From MaRDI portal
Publication:5445502
DOI10.1007/978-3-540-78524-8_8zbMath1162.94368OpenAlexW1520461456MaRDI QIDQ5445502
Publication date: 5 March 2008
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-78524-8_8
Related Items (2)
The TLS handshake protocol: A modular analysis ⋮ The Layered Games Framework for Specifications and Analysis of Security Protocols
Cites Work
- Unnamed Item
- Unnamed Item
- Compositional analysis of contract-signing protocols
- Reconciling two views of cryptography (The computational soundness of formal encryption)
- Security and composition of multiparty cryptographic protocols
- On the limitations of universally composable two-party computation without set-up assumptions
- Time-Bounded Task-PIOAs: A Framework for Analyzing Security Protocols
- On Secure Orders in the Presence of Faults
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- On the security of public key protocols
- Foundations of Cryptography
- The Layered Games Framework for Specifications and Analysis of Security Protocols
- Conditional Reactive Simulatability
- Theory of Cryptography
- Theory of Cryptography
This page was built for publication: The Layered Games Framework for Specifications and Analysis of Security Protocols