Non Interference for the Analysis of Cryptographic Protocols
- 1 January 2000
- book chapter
- Published by Springer Nature
- p. 354-372
- https://doi.org/10.1007/3-540-45022-x_31
Abstract
No abstract availableKeywords
This publication has 22 references indexed in Scilit:
- Secrecy in Security Protocols as Non InterferenceElectronic Notes in Theoretical Computer Science, 2000
- Message Authentication through Non InterferencePublished by Springer Nature ,2000
- A Uniform Approach for the Definition of Security PropertiesPublished by Springer Nature ,1999
- Security Protocols and SpecificationsPublished by Springer Nature ,1999
- A Calculus for Cryptographic Protocols: The Spi CalculusInformation and Computation, 1999
- Verifying authentication protocols in CSPIEEE Transactions on Software Engineering, 1998
- The Compositional Security Checker: a tool for the verification of information flow security propertiesIEEE Transactions on Software Engineering, 1997
- Prudent engineering practice for cryptographic protocolsIEEE Transactions on Software Engineering, 1996
- Notes on Communicating Sequential SystemsPublished by Springer Nature ,1986
- Testing equivalences for processesTheoretical Computer Science, 1984