Timed Spi-Calculus with Types for Secrecy and Authenticity
- 1 January 2005
- book chapter
- Published by Springer Nature
- p. 202-216
- https://doi.org/10.1007/11539452_18
Abstract
No abstract availableKeywords
This publication has 16 references indexed in Scilit:
- Automatic Verification of Time Sensitive Cryptographic ProtocolsPublished by Springer Nature ,2004
- Authenticity by typing for security protocols1Journal of Computer Security, 2003
- Typing One-to-One and One-to-Many Correspondences in Security ProtocolsPublished by Springer Nature ,2003
- Secrecy Types for Asymmetric CommunicationPublished by Springer Nature ,2001
- Analysing Time Dependent Security Properties in CSP Using PVSPublished by Springer Nature ,2000
- Secrecy by typing in security protocolsJournal of the ACM, 1999
- A Calculus for Cryptographic Protocols: The Spi CalculusInformation and Computation, 1999
- Prudent engineering practice for cryptographic protocolsIEEE Transactions on Software Engineering, 1996
- A logic of authenticationProceedings of the Royal Society of London. Series A. Mathematical and Physical Sciences, 1989
- Timestamps in key distribution protocolsCommunications of the ACM, 1981