Book Volume 5458 2009

Formal to Practical Security

Papers Issued from the 2005-2008 French-Japanese Collaboration

ISBN: 978-3-642-02001-8 (Print) 978-3-642-02002-5 (Online)

Table of contents (10 chapters)

  1. Front Matter

    Pages -

  2. Formal to Practical Security

    1. No Access

      Chapter

      Pages 1-20

      Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables

    2. No Access

      Chapter

      Pages 21-32

      Validating Integrity for the Ephemerizer’s Protocol with CL-Atse

    3. No Access

      Chapter

      Pages 33-56

      Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols

    4. No Access

      Chapter

      Pages 57-69

      Fake Fingers in Fingerprint Recognition: Glycerin Supersedes Gelatin

    5. No Access

      Chapter

      Pages 70-94

      Comparing State Spaces in Automatic Security Protocol Analysis

    6. No Access

      Chapter

      Pages 95-115

      Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures

    7. No Access

      Chapter

      Pages 116-137

      Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment

    8. No Access

      Chapter

      Pages 138-157

      New Anonymity Notions for Identity-Based Encryption

    9. No Access

      Chapter

      Pages 158-180

      Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption

    10. No Access

      Chapter

      Pages 181-197

      Writing an OS Kernel in a Strictly and Statically Typed Language

  3. Back Matter

    Pages -