01.08.2013 Views

(2012): Volumes 7200–7249 - Index of files in - University of Utah

(2012): Volumes 7200–7249 - Index of files in - University of Utah

(2012): Volumes 7200–7249 - Index of files in - University of Utah

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

REFERENCES 77<br />

Comon-Lundh:<strong>2012</strong>:SPD<br />

[312] Hubert Comon-Lundh, Véronique Cortier, and Guillaume Scerri. Security<br />

pro<strong>of</strong> with dishonest keys. Lecture Notes <strong>in</strong> Computer Science, 7215:<br />

149–168, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-3349<br />

(electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/978-<br />

3-642-28641-4_9/.<br />

Arap<strong>in</strong>is:<strong>2012</strong>:RET<br />

[313] Myrto Arap<strong>in</strong>is, Sergiu Bursuc, and Mark D. Ryan. Reduction <strong>of</strong> equational<br />

theories for verification <strong>of</strong> trace equivalence: Re-encryption, associativity<br />

and commutativity. Lecture Notes <strong>in</strong> Computer Science, 7215:<br />

169–188, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-3349<br />

(electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/978-<br />

3-642-28641-4_10/.<br />

Bana:<strong>2012</strong>:TUS<br />

[314] Gergei Bana and Hubert Comon-Lundh. Towards unconditional soundness:<br />

Computationally complete symbolic attacker. Lecture Notes <strong>in</strong><br />

Computer Science, 7215:189–208, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-<br />

9743 (pr<strong>in</strong>t), 1611-3349 (electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/<br />

chapter/10.1007/978-3-642-28641-4_11/.<br />

Barthe:<strong>2012</strong>:VIH<br />

[315] Gilles Barthe, Benjam<strong>in</strong> Grégoire, and Sylva<strong>in</strong> Heraud. Verified <strong>in</strong>differentiable<br />

hash<strong>in</strong>g <strong>in</strong>to elliptic curves. Lecture Notes <strong>in</strong> Computer Science,<br />

7215:209–228, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-<br />

3349 (electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/<br />

978-3-642-28641-4_12/.<br />

Datta:<strong>2012</strong>:PAL<br />

[316] Anupam Datta, Divya Sharma, and Arunesh S<strong>in</strong>ha. Provable deanonymization<br />

<strong>of</strong> large datasets with sparse dimensions. Lecture Notes<br />

<strong>in</strong> Computer Science, 7215:229–248, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-<br />

9743 (pr<strong>in</strong>t), 1611-3349 (electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/<br />

chapter/10.1007/978-3-642-28641-4_13/.<br />

Yen:<strong>2012</strong>:RBM<br />

[317] T<strong>in</strong>g-Fang Yen and Michael K. Reiter. Revisit<strong>in</strong>g botnet models and<br />

their implications for takedown strategies. Lecture Notes <strong>in</strong> Computer<br />

Science, 7215:249–268, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t),<br />

1611-3349 (electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.<br />

1007/978-3-642-28641-4_14/.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!