In recent work the notion of a secrecy logic S over a given deductive system S was introduced. Secrecy logics capture the essential features of structures that are used in performing secrecy-preserving reasoning in practical applications. More precisely, they model knowledge bases that consist of information, part of which is considered known to the user and part of which is to remain secret from the user. S-secrecy structures serve as the models of secrecy logics. Several of the universal algebraic and model theoretic properties of the class of S-secrecy structures of a given S-secrecy logic have already been studied. In this paper, our goal is to show how techniques from the theory of abstract alge-braic logic may be used to analyze the s...
A distributed proof system is an effective way for deriving useful information by combining data fro...
Thesis (PhD)--Stellenbosch University, 2016.ENGLISH ABSTRACT: In this thesis, we study a formal prog...
Kevin O'Neill's Ph.D. DissertationWhen building systems that guarantee confidentiality, system desig...
Let S = 〈L, S 〉 be a deductive system. An S-secrecy logic is a quadruple K = 〈FmL(V),K,B, S 〉, where...
Privacy, copyright, security and other concerns make it essential for many distributed web applicati...
Privacy, copyright, security and other concerns make it essential for many distributed web applicati...
Inmany applications of networked information systems, the need to share information often has to be ...
Abstract. Secrecy and authenticity properties of protocols are mutu-ally dependent: every authentica...
We propose a general framework of secrecy and preservation of secrecy for labeled transition systems...
AbstractA cryptographic protocol is a distributed program that can be executed by several actors. Si...
Two styles of definitions are usually considered to express that a security protocol preserves the c...
In the spirit of Shannon s theory of secrecy systems we analyse several possible natural definitons ...
AbstractIn this paper, we present three algebraic constructions of authentication codes with secrecy...
In this paper, we revisit formalizations of information-theoretic security for symmetric-key encrypt...
The standard symbolic, deducibility-based notions of secrecy are in general insufficient from a cry...
A distributed proof system is an effective way for deriving useful information by combining data fro...
Thesis (PhD)--Stellenbosch University, 2016.ENGLISH ABSTRACT: In this thesis, we study a formal prog...
Kevin O'Neill's Ph.D. DissertationWhen building systems that guarantee confidentiality, system desig...
Let S = 〈L, S 〉 be a deductive system. An S-secrecy logic is a quadruple K = 〈FmL(V),K,B, S 〉, where...
Privacy, copyright, security and other concerns make it essential for many distributed web applicati...
Privacy, copyright, security and other concerns make it essential for many distributed web applicati...
Inmany applications of networked information systems, the need to share information often has to be ...
Abstract. Secrecy and authenticity properties of protocols are mutu-ally dependent: every authentica...
We propose a general framework of secrecy and preservation of secrecy for labeled transition systems...
AbstractA cryptographic protocol is a distributed program that can be executed by several actors. Si...
Two styles of definitions are usually considered to express that a security protocol preserves the c...
In the spirit of Shannon s theory of secrecy systems we analyse several possible natural definitons ...
AbstractIn this paper, we present three algebraic constructions of authentication codes with secrecy...
In this paper, we revisit formalizations of information-theoretic security for symmetric-key encrypt...
The standard symbolic, deducibility-based notions of secrecy are in general insufficient from a cry...
A distributed proof system is an effective way for deriving useful information by combining data fro...
Thesis (PhD)--Stellenbosch University, 2016.ENGLISH ABSTRACT: In this thesis, we study a formal prog...
Kevin O'Neill's Ph.D. DissertationWhen building systems that guarantee confidentiality, system desig...