Hubert Comon-Lundh, Véronique Cortier, Guillaume Scerri. Security Proof with Dishonest Keys. In Pierpaolo Degano, Joshua D. Guttman, editors, Principles of Security and Trust - First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings. Volume 7215 of Lecture Notes in Computer Science, pages 149-168, Springer, 2012. [doi]
@inproceedings{Comon-LundhCS12-0, title = {Security Proof with Dishonest Keys}, author = {Hubert Comon-Lundh and Véronique Cortier and Guillaume Scerri}, year = {2012}, doi = {10.1007/978-3-642-28641-4_9}, url = {http://dx.doi.org/10.1007/978-3-642-28641-4_9}, researchr = {https://researchr.org/publication/Comon-LundhCS12-0}, cites = {0}, citedby = {0}, pages = {149-168}, booktitle = {Principles of Security and Trust - First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings}, editor = {Pierpaolo Degano and Joshua D. Guttman}, volume = {7215}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-28640-7}, }