@article{Blakey/13, AUTHOR = {Blakey, Ed}, TITLE = {Complexity-style resources in cryptography}, JOURNAL = {Inf.~Comput.}, VOLUME = {226}, PAGES = {3-15}, YEAR = {2013}, EDITOR = {Meyer, Albert R.}, KEYWORDS = {computational complexity, cryptography, factorization, resource, security, unconventional computation}, URL = {http://www.sciencedirect.com/science/article/pii/S0890540113000205}, PUBLISHER = {Elsevier B.V.}, ADDRESS = {Amsterdam-Boston-London-New York-Oxford-Paris-Philadelphia-San Diego-San Louis}, } @article{Canetti-Riva-Rothblum/13, AUTHOR = {Canetti, Ran and Riva, Ben and Rothblum, Guy N.}, TITLE = {Refereed delegation of computation}, JOURNAL = {Inf.~Comput.}, VOLUME = {226}, PAGES = {16-36}, YEAR = {2013}, EDITOR = {Meyer, Albert R.}, KEYWORDS = {refereed games, verifiable computation, delegation of computation}, URL = {http://www.sciencedirect.com/science/article/pii/S0890540113000217}, PUBLISHER = {Elsevier B.V.}, ADDRESS = {Amsterdam-Boston-London-New York-Oxford-Paris-Philadelphia-San Diego-San Louis}, } @article{Capar-Goeckel-Paterson-Quaglia-Towsley-Zafer/13, AUTHOR = {{\c{C}}apar, {\c{C}}a{\v{g}}atay and Goeckel, Dennis and Paterson, Kenneth G. and Quaglia, Elizabeth A. and Towsley, Don and Zafer, Murtaza}, TITLE = {Signal-flow-based analysis of wireless security protocols}, JOURNAL = {Inf.~Comput.}, VOLUME = {226}, PAGES = {37-56}, YEAR = {2013}, EDITOR = {Meyer, Albert R.}, KEYWORDS = {security protocols, wireless, cost, linear system, physical layer, key exchange}, URL = {http://www.sciencedirect.com/science/article/pii/S0890540113000229}, PUBLISHER = {Elsevier B.V.}, ADDRESS = {Amsterdam-Boston-London-New York-Oxford-Paris-Philadelphia-San Diego-San Louis}, } @article{Espinoza-Smith/13, AUTHOR = {Espinoza, Barbara and Smith, Geoffrey}, TITLE = {Min-entropy as a resource}, JOURNAL = {Inf.~Comput.}, VOLUME = {226}, PAGES = {57-75}, YEAR = {2013}, EDITOR = {Meyer, Albert R.}, KEYWORDS = {secrecy, quantitative information flow, information theory}, URL = {http://www.sciencedirect.com/science/article/pii/S0890540113000230}, PUBLISHER = {Elsevier B.V.}, ADDRESS = {Amsterdam-Boston-London-New York-Oxford-Paris-Philadelphia-San Diego-San Louis}, } @article{Malacaria-Smeraldi/13, AUTHOR = {Malacaria, Pasquale and Smeraldi, Fabrizio}, TITLE = {Thermodynamic aspects of confidentiality}, JOURNAL = {Inf.~Comput.}, VOLUME = {226}, PAGES = {76-93}, YEAR = {2013}, EDITOR = {Meyer, Albert R.}, KEYWORDS = {information theory, security, thermodynamics}, URL = {http://www.sciencedirect.com/science/article/pii/S0890540113000242}, PUBLISHER = {Elsevier B.V.}, ADDRESS = {Amsterdam-Boston-London-New York-Oxford-Paris-Philadelphia-San Diego-San Louis}, } @article{Pavlovic/13, AUTHOR = {Pavlovic, Dusko}, TITLE = {Monoidal computer I: Basic computability by string diagrams}, JOURNAL = {Inf.~Comput.}, VOLUME = {226}, PAGES = {94-116}, YEAR = {2013}, EDITOR = {Meyer, Albert R.}, URL = {http://www.sciencedirect.com/science/article/pii/S0890540113000254}, PUBLISHER = {Elsevier B.V.}, ADDRESS = {Amsterdam-Boston-London-New York-Oxford-Paris-Philadelphia-San Diego-San Louis}, }