Gergely Bana
AuthID: R-000-V7C
1
TÃTULO: Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols Full Text
AUTORES: Gergei Bana; Koji Hasebe; Mitsuhiro Okada;
PUBLICAÇÃO: 2009, FONTE: French/Japanese Computer Security Workshop in FORMAL TO PRACTICAL SECURITY, VOLUME: 5458
AUTORES: Gergei Bana; Koji Hasebe; Mitsuhiro Okada;
PUBLICAÇÃO: 2009, FONTE: French/Japanese Computer Security Workshop in FORMAL TO PRACTICAL SECURITY, VOLUME: 5458
2
TÃTULO: Soundness and completeness of formal encryption: The cases of key cycles and partial information leakage Full Text
AUTORES: Pedro Adão ; Gergei Bana; Jonathan Herzog; Andre Scedrov;
PUBLICAÇÃO: 2009, FONTE: Journal of Computer Security, VOLUME: 17, NÚMERO: 5
AUTORES: Pedro Adão ; Gergei Bana; Jonathan Herzog; Andre Scedrov;
PUBLICAÇÃO: 2009, FONTE: Journal of Computer Security, VOLUME: 17, NÚMERO: 5
3
TÃTULO: Soundness of formal encryption in the presence of key-cycles
AUTORES: Adao, P ; Bana, G; Herzog, J; Scedrov, A;
PUBLICAÇÃO: 2005, FONTE: 10th European Symposium on Research in Computer Security in COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, VOLUME: 3679
AUTORES: Adao, P ; Bana, G; Herzog, J; Scedrov, A;
PUBLICAÇÃO: 2005, FONTE: 10th European Symposium on Research in Computer Security in COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, VOLUME: 3679
INDEXADO EM: Scopus WOS DBLP
4
TÃTULO: Computational and information-theoretic soundness and completeness of formal encryption
AUTORES: Adao, P ; Bana, G; Scedrov, A;
PUBLICAÇÃO: 2005, FONTE: 18th IEEE Computer Security Foundations Workshop in 18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS
AUTORES: Adao, P ; Bana, G; Scedrov, A;
PUBLICAÇÃO: 2005, FONTE: 18th IEEE Computer Security Foundations Workshop in 18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS