Jamroga, Wojciech ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Mauw, Sjouke ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Melissen, Matthijs ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Language :
English
Title :
Fairness in Non-repudiation Protocols
Publication date :
2012
Event name :
7th International Workshop, STM 2011
Event place :
Copenhagen, Denmark
Event date :
2011
Main work title :
Proceedings of STM 2011
Publisher :
Springer
ISBN/EAN :
978-3-642-29962-9
Pages :
122-139
Peer reviewed :
Peer reviewed
Commentary :
7170
Security and Trust Management Lecture Notes in Computer Science
Roscoe, A.: Intensional Specifications of Security Protocols. In: Proc. CSFW 1996, pp. 28-38. IEEE (1996
Lowe, G.: A hierarchy of authentication specifications. In: 10th Computer Security Foundations Workshop (CSFW 1997), June 10-12, pp. 31-44. IEEE Computer Society, Rockport (1997
Cremers, C., Mauw, S., de Vink, E.: Injective synchronisation: An extension of the authentication hierarchy. Theoretical Computer Science 367, 139-161 (2006); Special issue on ARSPA 2005, (P. Degano and L. Viganò, eds. (Pubitemid 44648579)
Benaloh, J., Tuinstra, D.: Receipt-free secret ballot elections (extended abstract). In: Proc. 26th ACM Symposium on the Theory of Computing (STOC), pp. 544-553. ACM (1994
Delaune, S., Kremer, S., Ryan, M.: Coercion-resistance and receipt-freeness in electronic voting. In: Proceedings of the 19th IEEE Computer Security Foundations Workshop (CSFW 2006). IEEE Computer Society Press, Venice (2006
van Deursen, T., Mauw, S., Radomirovíc, S., Vullers, P.: Secure Ownership and Ownership Transfer in RFID Systems. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 637-654. Springer, Heidelberg (2009
Asokan, N., Shoup, V., Waidner, M.: Asynchronous Protocols for Optimistic Fair Exchange. In: Proc. of the IEEE Symp. in Security and Privacy, pp. 86-99 (1998
Alur, R., Henzinger, T.A., Kupferman, O.: Alternating-Time temporal logic. Journal of the ACM 49, 672-713 (2002
Alur, R., Henzinger, T., Mang, F., Qadeer, S., Rajamani, S., Tasiran, S.: MOCHA: Modularity in Model Checking. In: Vardi, M.Y. (ed.) CAV 1998. LNCS, vol. 1427, pp. 521-525. Springer, Heidelberg (1998
Chadha, R., Kremer, S., Scedrov, A.: Formal Analysis of Multiparty Contract Signing. Journal of Automated Reasoning 36, 39-83 (2006 (Pubitemid 44601133)
Ben-Or, M., Goldreich, O., Micali, S., Rivest, R.: A fair protocol for signing contracts. IEEE Transactions on Information Theory T-36, 40-46 (1990
Even, S., Yacobi, Y.: Relations among public key signature systems (1980
Ezhilchelvan, P.D., Shrivastava, S.K.: Systematic Development of a Family of Fair Exchange Protocols. In: Proc. of the 17th Annual IFIP WG 11.3 Working Conference on Database and Applications Security, pp. 243-258. Kluwer Academic Press (2003
Liu, P.: Avoiding loss of fairness owing to failures in fair data exchange systems. Decision Support Systems 31, 337-350 (2001 (Pubitemid 32590543)
Kremer, S., Raskin, J.F.: A game-based verification of non-repudiation and fair exchange protocols. Journal of Computer Security 11 (2003
Jamroga, W., van der Hoek, W.: Agents that know how to play. Fundamenta Informaticae 63, 185-219 (2004 (Pubitemid 41218159)
Schobbens, P.Y.: Alternating-Time logic with imperfect recall. Electronic Notes in Theoretical Computer Science 85, 82-93 (2004
Jamroga, W., Bulling, N.: Comparing variants of strategic ability. In: Proceedings of EUMAS 2010 (2010
Zhou, J., Gollmann, D.: An efficient non-repudiation protocol. In: Proceedings 10th Computer Security Foundations Workshop, pp. 126-132 (1997
Markowitch, O., Kremer, S.: A Multi-Party Optimistic Non-Repudiation Protocol. In: Won, D. (ed.) ICISC 2000. LNCS, vol. 2015, pp. 109-122. Springer, Heidelberg (2001
Kremer, S., Markowitch, O.: Optimistic non-repudiable information exchange. In: Biemond, J. (ed.) 21th Symp. on Information Theory in the Benelux,Werkgemeenschap Informatie-en Communicatietheorie, Enschede, pp. 139-146 (2000
Lomuscio, A., Qu, H., Raimondi, F.: MCMAS: A Model Checker for the Verification of Multi-Agent Systems. In: Bouajjani, A., Maler, O. (eds.) CAV 2009. LNCS, vol. 5643, pp. 682-688. Springer, Heidelberg (2009
Berwanger, D., Chatterjee, K., De Wulf, M., Doyen, L., Henzinger, T.A.: Alpaga: A Tool for Solving Parity Games with Imperfect Information. In: Kowalewski, S., Philippou, A. (eds.) TACAS 2009. LNCS, vol. 5505, pp. 58-61. Springer, Heidelberg (2009)