Secrecy Types for Asymmetric Communication
- 23 March 2001
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 25 references indexed in Scilit:
- Secrecy and Group CreationPublished by Springer Nature ,2000
- Information Flow vs. Resource Access in the Asynchronous Pi-Calculus (Extended Abstract)Published by Springer Nature ,2000
- Secrecy by typing in security protocolsJournal of the ACM, 1999
- A Calculus for Cryptographic Protocols: The Spi CalculusInformation and Computation, 1999
- The SLam calculusPublished by Association for Computing Machinery (ACM) ,1998
- Control flow analysis for the π-calculusPublished by Springer Nature ,1998
- Prudent engineering practice for cryptographic protocolsIEEE Transactions on Software Engineering, 1996
- Network objectsSoftware: Practice and Experience, 1995
- Robustness Principles for Public Key ProtocolsPublished by Springer Nature ,1995
- Probabilistic encryptionJournal of Computer and System Sciences, 1984