Mobile values, new names, and secure communication
Top Cited Papers
- 1 January 2001
- proceedings article
- Published by Association for Computing Machinery (ACM)
- Vol. 36 (3) , 104-115
- https://doi.org/10.1145/360204.360213
Abstract
No abstract availableThis publication has 19 references indexed in Scilit:
- Secrecy by typing in security protocolsJournal of the ACM, 1999
- A Calculus for Cryptographic Protocols: The Spi CalculusInformation and Computation, 1999
- On the bisimulation proof methodMathematical Structures in Computer Science, 1998
- A hierarchy of equivalences for asynchronous calculiPublished by Springer Nature ,1998
- Protection in programming-language translationsPublished by Springer Nature ,1998
- Authentication and authenticated key exchangesDesigns, Codes and Cryptography, 1992
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksSIAM Journal on Computing, 1988
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983
- New directions in cryptographyIEEE Transactions on Information Theory, 1976