Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
How to withstand mobile virus attacks (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
A logic for reasoning about security
ACM Transactions on Computer Systems (TOCS)
Reasoning about knowledge
Digital cash: commerce on the net
Digital cash: commerce on the net
Unlinkable serial transactions: protocols and applications
ACM Transactions on Information and System Security (TISSEC)
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Protocols Using Anonymous Connections: Mobile Applications
Proceedings of the 5th International Workshop on Security Protocols
The epistemic representation of information flow security in probabilistic systems
CSFW '95 Proceedings of the 8th IEEE workshop on Computer Security Foundations
A Different Look at Secure Distributed Computation
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Probabilistic Noninterference in a Concurrent Language
CSFW '98 Proceedings of the 11th IEEE workshop on Computer Security Foundations
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
Crowds: Anonymity for Web Transactions
Crowds: Anonymity for Web Transactions
Anonymous Connections and Onion Routing
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Distributed Computing
The free haven project: distributed anonymous storage service
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
The Logic of Authentication Protocols
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Authentic Attributes with Fine-Grained Anonymity Protection
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Probabilistic Analysis of Anonymity
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
CONCUR 2005 - Concurrency Theory
An Indistinguishability-Based Characterization of Anonymous Channels
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Complexity of anonymity for security protocols
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Nexus authorization logic (NAL): Design rationale and applications
ACM Transactions on Information and System Security (TISSEC)
Modeling identity-related properties and their privacy strength
FAST'10 Proceedings of the 7th International conference on Formal aspects of security and trust
Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach
Transactions on Data Privacy
Probabilistic analysis of onion routing in a black-box model
ACM Transactions on Information and System Security (TISSEC)
Reasoning about minimal anonymity in security protocols
Future Generation Computer Systems
Hi-index | 0.00 |
We introduce the concept of a group principal and present a number of different classes of group principals, including thresholdgroup-principals. These appear to naturally useful concepts for looking at security. We provide an associated epistemic language and logic and use it to reason about anonymity protocols and anonymity services, where protection properties are formulated from the intruder's knowledge of group principals. Using our language, we give an epistemic characterization of anonymity properties. We also present a specification of a simple anonymizing system using our theory.