Message Authentication through Non Interference
- 19 May 2000
- book chapter
- Published by Springer Nature
- p. 258-272
- https://doi.org/10.1007/3-540-45499-3_20
Abstract
No abstract availableKeywords
This publication has 19 references indexed in Scilit:
- CVS: a compiler for the analysis of cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- A Uniform Approach for the Definition of Security PropertiesPublished by Springer Nature ,1999
- A Calculus for Cryptographic Protocols: The Spi CalculusInformation and Computation, 1999
- Authentication via localized namesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1999
- Reasoning about cryptographic protocols in the spi calculusPublished by Springer Nature ,1997
- The Compositional Security Checker: a tool for the verification of information flow security propertiesIEEE Transactions on Software Engineering, 1997
- A Classification of Security Properties for Process Algebras1Journal of Computer Security, 1995
- A logic of authenticationProceedings of the Royal Society of London. Series A. Mathematical and Physical Sciences, 1989
- Testing equivalences for processesTheoretical Computer Science, 1984
- Security Policies and Security ModelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982