Secrecy by typing in security protocols
- 1 January 1997
- book chapter
- Published by Springer Nature
- p. 611-638
- https://doi.org/10.1007/bfb0014571
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- A calculus for cryptographic protocolsPublished by Association for Computing Machinery (ACM) ,1997
- Proof-carrying codePublished by Association for Computing Machinery (ACM) ,1997
- Reasoning about cryptographic protocols in the spi calculusPublished by Springer Nature ,1997
- Prudent engineering practice for cryptographic protocolsIEEE Transactions on Software Engineering, 1996
- Testing Equivalence for Mobile ProcessesInformation and Computation, 1995
- Provably secure session key distributionPublished by Association for Computing Machinery (ACM) ,1995
- A calculus of mobile processes, IIInformation and Computation, 1992
- A logic of authenticationProceedings of the Royal Society of London. Series A. Mathematical and Physical Sciences, 1989
- Testing equivalences for processesTheoretical Computer Science, 1984
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978