@ARTICLE{HerzogEtAl97,
AUTHOR = {Jonathan Herzog and Christopher McLaren and Anant Godbole},
TITLE = {Generalized $k$-matches},
JOURNAL = {Statistics and Probability Letters},
YEAR = 1998,
VOLUME = 38,
PAGES = {167--175}
}
@INPROCEEDINGS{ThayerHerzogGuttman98,
AUTHOR = {F. Javier {\textsc{Thayer} F\'{a}brega} and Jonathan Herzog and Joshua D. Guttman},
TITLE = {Strand Spaces: Why is a Security Protocol Correct?},
BOOKTITLE = {1998 {IEEE} Symposium on Security and Privacy},
YEAR = 1998,
MONTH = {May},
URL = {http://www.mitre.org/work/tech_papers/tech_papers_00/guttman_strands/index.html},
PUBLISHER = {{IEEE} Computer Society Press}
}
@INPROCEEDINGS{ThayerHerzogGuttman98a,
AUTHOR = {F. Javier {\textsc{Thayer} F\'{a}brega} and Jonathan Herzog and Joshua D. Guttman},
TITLE = {Honest Ideals on Strand Spaces},
BOOKTITLE = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop},
YEAR = 1998,
MONTH = {June},
URL = {http://www.mitre.org/work/tech_papers/tech_papers_00/guttman_honest/index.html},
PUBLISHER = {{IEEE} Computer Society Press}
}
@ARTICLE{ThayerHerzogGuttman99,
AUTHOR = {F. Javier Thayer and Jonathan Herzog and Joshua D. Guttman},
TITLE = {Strand Spaces: Proving Security Protocols Correct},
JOURNAL = {Journal of Computer Security},
YEAR = 1999,
VOLUME = 7,
NUMBER = {2/3},
URL = {http://www.mitre.org/work/best_papers/best_papers_99/winner_strand_spaces/index.html},
PAGES = {191--230}
}
@INPROCEEDINGS{ThayerHerzogGuttman99a,
AUTHOR = {F. Javier {\textsc{Thayer} F\'{a}brega} and Jonathan Herzog and Joshua D. Guttman},
TITLE = {Mixed Strand Spaces},
BOOKTITLE = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop},
YEAR = 1999,
MONTH = {June},
URL = {http://www.mitre.org/work/tech_papers/tech_papers_00/guttman_mprotocols/index.html},
PUBLISHER = {{IEEE} Computer Society Press}
}
@MASTERSTHESIS{Herzog02,
AUTHOR = {Jonathan Herzog},
TITLE = {Computational Soundness for Formal Adversaries},
SCHOOL = {Massachusetts Institute of Technology},
YEAR = 2002,
PS = {http://theory.lcs.mit.edu/~cis/theses/jherzog-masters.ps},
PDF = {http://theory.lcs.mit.edu/~cis/theses/jherzog-masters.pdf},
MONTH = {October}
}
@INPROCEEDINGS{Herzog03,
AUTHOR = {Jonathan Herzog},
TITLE = {The {Diffie-Hellman} Key-Agreement Scheme in the Strand-Space Model},
BOOKTITLE = {16th Computer Security Foundations Workshop},
PAGES = {234--247},
YEAR = 2003,
ADDRESS = {Asilomar, CA},
MONTH = {June},
URL = {http://www.mitre.org/work/tech_papers/tech_papers_03/herzog_diffie_strands/index.html},
PUBLISHER = {{IEEE CS} Press}
}
@INPROCEEDINGS{HerzogEtAl03,
AUTHOR = {Jonathan Herzog and Moses Liskov and Silvio Micali},
TITLE = {Plaintext Awareness via Key Registration},
PAGES = {548-564},
BOOKTITLE = {Advances in Cryptology - {CRYPTO} 2003},
YEAR = 2003,
EDITOR = {Dan Boneh},
VOLUME = 2729,
SERIES = {Lecture Notes in Computer Science},
MONTH = {August},
PS = {http://theory.csail.mit.edu/~jherzog/papers/plaintext_aware.ps},
PDF = {http://theory.csail.mit.edu/~jherzog/papers/plaintext_aware.ps},
PUBLISHER = {Springer-Verlag}
}
@PHDTHESIS{Herzog04,
AUTHOR = {Jonathan Herzog},
TITLE = {Computational Soundness for Standard Assumptions of Formal Cryptography},
SCHOOL = {Massachusetts Institute of Technology},
YEAR = 2004,
PS = {http://theory.csail.mit.edu/~jherzog/papers/herzog-phd.ps},
PDF = {http://theory.csail.mit.edu/~jherzog/papers/herzog-phd.pdf},
MONTH = {May}
}
@INPROCEEDINGS{GuttmanEtAl04,
AUTHOR = {Joshua D. {Guttman} and F. Javier Thayer and Jay A. Carlson and Jonathan Herzog and John D. Ramsdell and Brian T. Sniffen},
TITLE = {Trust Management in Strand Spaces: A Rely-Guarantee Method},
BOOKTITLE = {Programming Languages and Systems: 13th European Symposium on Programming},
PAGES = {325--339},
YEAR = 2004,
EDITOR = {David Schmidt},
NUMBER = 2986,
SERIES = {LNCS},
PS = {http://theory.csail.mit.edu/~jherzog/papers/rely-guarantee.ps},
PDF = {http://theory.csail.mit.edu/~jherzog/papers/rely-guarantee.pdf},
PUBLISHER = {Springer}
}
@MISC{CanettiHerzog04,
AUTHOR = {Ran Canetti and Jonathan Herzog},
TITLE = {Universally Composable Symbolic Analysis of Cryptographic Protocols (The case of encryption-based mutual authentication and key exchange)},
HOWPUBLISHED = {Cryptology ePrint Archive, Report 2004/334},
YEAR = {2004},
URL = {http://eprint.iacr.org/}
}
@ARTICLE{Herzog05,
AUTHOR = {Jonathan Herzog},
TITLE = {A Computational Interpretation of Dolev-Yao Adversaries},
JOURNAL = {Theoretical Computer Science},
PUBLISHER = {Elsevier},
MONTH = {June},
YEAR = {2005}
}
@UNPUBLISHED{YounEtAl04,
AUTHOR = {Paul Youn and Ben Adida and Mike Bond and Jolyon Clulow and Jonathan Herzog and Amerson Lin and Ronald L. Rivest},
TITLE = {Robbing the Bank with a Theorem Prover},
NOTE = {In submission},
MONTH = {November},
YEAR = 2004
}
@UNPUBLISHED{CanettiHerzog05,
AUTHOR = {Ran Canetti and Jonathan Herzog},
TITLE = {Universally Composable Symbolic Analysis of Cryptographic Protocols (The case of encryption-based mutual authentication and key exchange)},
NOTE = {In submission}
}
@UNPUBLISHED{AdaoEtAl05,
AUTHOR = {Pedro Ad\~ao and Gergei Bana and Jonathan Herzog and Andre Scedrov},
TITLE = {Soundness of Abadi-Rogaway Logics in the Presence of Key-Cycles},
NOTE = {In submission}
}
This file has been generated by bibtex2html 1.74