(2012): Volumes 7200–7249 - Index of files in - University of Utah
(2012): Volumes 7200–7249 - Index of files in - University of Utah
(2012): Volumes 7200–7249 - Index of files in - University of Utah
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
REFERENCES 77<br />
Comon-Lundh:<strong>2012</strong>:SPD<br />
[312] Hubert Comon-Lundh, Véronique Cortier, and Guillaume Scerri. Security<br />
pro<strong>of</strong> with dishonest keys. Lecture Notes <strong>in</strong> Computer Science, 7215:<br />
149–168, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-3349<br />
(electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/978-<br />
3-642-28641-4_9/.<br />
Arap<strong>in</strong>is:<strong>2012</strong>:RET<br />
[313] Myrto Arap<strong>in</strong>is, Sergiu Bursuc, and Mark D. Ryan. Reduction <strong>of</strong> equational<br />
theories for verification <strong>of</strong> trace equivalence: Re-encryption, associativity<br />
and commutativity. Lecture Notes <strong>in</strong> Computer Science, 7215:<br />
169–188, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-3349<br />
(electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/978-<br />
3-642-28641-4_10/.<br />
Bana:<strong>2012</strong>:TUS<br />
[314] Gergei Bana and Hubert Comon-Lundh. Towards unconditional soundness:<br />
Computationally complete symbolic attacker. Lecture Notes <strong>in</strong><br />
Computer Science, 7215:189–208, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-<br />
9743 (pr<strong>in</strong>t), 1611-3349 (electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/<br />
chapter/10.1007/978-3-642-28641-4_11/.<br />
Barthe:<strong>2012</strong>:VIH<br />
[315] Gilles Barthe, Benjam<strong>in</strong> Grégoire, and Sylva<strong>in</strong> Heraud. Verified <strong>in</strong>differentiable<br />
hash<strong>in</strong>g <strong>in</strong>to elliptic curves. Lecture Notes <strong>in</strong> Computer Science,<br />
7215:209–228, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-<br />
3349 (electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/<br />
978-3-642-28641-4_12/.<br />
Datta:<strong>2012</strong>:PAL<br />
[316] Anupam Datta, Divya Sharma, and Arunesh S<strong>in</strong>ha. Provable deanonymization<br />
<strong>of</strong> large datasets with sparse dimensions. Lecture Notes<br />
<strong>in</strong> Computer Science, 7215:229–248, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-<br />
9743 (pr<strong>in</strong>t), 1611-3349 (electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/<br />
chapter/10.1007/978-3-642-28641-4_13/.<br />
Yen:<strong>2012</strong>:RBM<br />
[317] T<strong>in</strong>g-Fang Yen and Michael K. Reiter. Revisit<strong>in</strong>g botnet models and<br />
their implications for takedown strategies. Lecture Notes <strong>in</strong> Computer<br />
Science, 7215:249–268, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t),<br />
1611-3349 (electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.<br />
1007/978-3-642-28641-4_14/.