Cryptology ePrint Archive: Report 2009/079
Available versions in chronological order
20090218:170209 (posted 18-Feb-2009 17:02:09 UTC)
From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries
David Basin and Cas Cremers
20090224:100109 (posted 24-Feb-2009 10:01:09 UTC)
From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries
David Basin and Cas Cremers
20090224:100138 (posted 24-Feb-2009 10:01:38 UTC)
From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries
David Basin and Cas Cremers
20090224:100155 (posted 24-Feb-2009 10:01:55 UTC)
From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries
David Basin and Cas Cremers
20090226:144444 (posted 26-Feb-2009 14:44:44 UTC)
From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries
David Basin and Cas Cremers
20091103:090357 (posted 03-Nov-2009 09:03:57 UTC)
From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries
David Basin and Cas Cremers
20091108:211645 (posted 08-Nov-2009 21:16:45 UTC)
From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries
David Basin and Cas Cremers
20091109:145451 (posted 09-Nov-2009 14:54:51 UTC)
From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries
David Basin and Cas Cremers
[
Cryptology ePrint archive
]