On the secure implementation of security protocols
- 31 March 2004
- journal article
- Published by Elsevier in Science of Computer Programming
- Vol. 50 (1-3) , 73-99
- https://doi.org/10.1016/j.scico.2004.01.002
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- Handling Encryption in an Analysis for Secure Information FlowPublished by Springer Nature ,2003
- What is intransitive noninterference?Published by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Language-based information-flow securityIEEE Journal on Selected Areas in Communications, 2003
- Confidentiality for mobile code: the case of a simple payment protocolPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Secure introduction of one-way functionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Soundness of data refinement for a higher-order imperative languageTheoretical Computer Science, 2002
- A Per Model of Secure Information Flow in Sequential ProgramsHigher-Order and Symbolic Computation, 2001
- A core calculus of dependencyPublished by Association for Computing Machinery (ACM) ,1999
- A sound type system for secure flow analysisJournal of Computer Security, 1996
- A Classification of Security Properties for Process Algebras1Journal of Computer Security, 1995