Gergely Bana
AuthID: R-000-V7C
1
TITLE: Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols Full Text
AUTHORS: Gergei Bana; Koji Hasebe; Mitsuhiro Okada;
PUBLISHED: 2009, SOURCE: French/Japanese Computer Security Workshop in FORMAL TO PRACTICAL SECURITY, VOLUME: 5458
AUTHORS: Gergei Bana; Koji Hasebe; Mitsuhiro Okada;
PUBLISHED: 2009, SOURCE: French/Japanese Computer Security Workshop in FORMAL TO PRACTICAL SECURITY, VOLUME: 5458
2
TITLE: Soundness and completeness of formal encryption: The cases of key cycles and partial information leakage Full Text
AUTHORS: Pedro Adão ; Gergei Bana; Jonathan Herzog; Andre Scedrov;
PUBLISHED: 2009, SOURCE: Journal of Computer Security, VOLUME: 17, ISSUE: 5
AUTHORS: Pedro Adão ; Gergei Bana; Jonathan Herzog; Andre Scedrov;
PUBLISHED: 2009, SOURCE: Journal of Computer Security, VOLUME: 17, ISSUE: 5
3
TITLE: Soundness of formal encryption in the presence of key-cycles
AUTHORS: Adao, P ; Bana, G; Herzog, J; Scedrov, A;
PUBLISHED: 2005, SOURCE: 10th European Symposium on Research in Computer Security in COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, VOLUME: 3679
AUTHORS: Adao, P ; Bana, G; Herzog, J; Scedrov, A;
PUBLISHED: 2005, SOURCE: 10th European Symposium on Research in Computer Security in COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, VOLUME: 3679
INDEXED IN: Scopus WOS DBLP
4
TITLE: Computational and information-theoretic soundness and completeness of formal encryption
AUTHORS: Adao, P ; Bana, G; Scedrov, A;
PUBLISHED: 2005, SOURCE: 18th IEEE Computer Security Foundations Workshop in 18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS
AUTHORS: Adao, P ; Bana, G; Scedrov, A;
PUBLISHED: 2005, SOURCE: 18th IEEE Computer Security Foundations Workshop in 18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS