Secrecy types for asymmetric communication
- 11 April 2003
- journal article
- Published by Elsevier BV in Theoretical Computer Science
- Vol. 298 (3), 387-415
- https://doi.org/10.1016/s0304-3975(02)00863-0
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- Analyzing security protocols with secrecy types and logic programsPublished by Association for Computing Machinery (ACM) ,2002
- Information Flow vs. Resource Access in the Asynchronous Pi-Calculus (Extended Abstract)Lecture Notes in Computer Science, 2000
- Secrecy by typing in security protocolsJournal of the ACM, 1999
- A Calculus for Cryptographic Protocols: The Spi CalculusInformation and Computation, 1999
- Prudent engineering practice for cryptographic protocolsIEEE Transactions on Software Engineering, 1996
- Network objectsSoftware: Practice and Experience, 1995
- Three systems for cryptographic protocol analysisJournal of Cryptology, 1994
- A calculus of mobile processes, IInformation and Computation, 1992
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978