Secrecy in Security Protocols as Non Interference
Open Access
- 31 December 2000
- journal article
- Published by Elsevier in Electronic Notes in Theoretical Computer Science
- Vol. 32, 101-112
- https://doi.org/10.1016/s1571-0661(04)00097-0
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- CVS: a compiler for the analysis of cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Towards a completeness result for model checking of security protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A hierarchy of authentication specificationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A Uniform Approach for the Definition of Security PropertiesPublished by Springer Nature ,1999
- A Calculus for Cryptographic Protocols: The Spi CalculusInformation and Computation, 1999
- The Compositional Security Checker: a tool for the verification of information flow security propertiesIEEE Transactions on Software Engineering, 1997
- Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDRPublished by Springer Nature ,1996
- A Classification of Security Properties for Process Algebras1Journal of Computer Security, 1995
- A logic of authenticationProceedings of the Royal Society of London. Series A. Mathematical and Physical Sciences, 1989
- Security Policies and Security ModelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982