Pages that link to "Item:Q1854437"
From MaRDI portal
The following pages link to Static analysis for the \(\pi\)-calculus with applications to security (Q1854437):
Displaying 17 items.
- A calculus of trustworthy ad hoc networks (Q470043) (← links)
- Weakening the perfect encryption assumption in Dolev-Yao adversaries (Q557896) (← links)
- From flow logic to static type systems for coordination languages (Q967521) (← links)
- A theory of structural stationarity in the \(\pi\)-calculus (Q1014276) (← links)
- Validating firewalls using flow logics (Q1603656) (← links)
- A monotone framework for CCS (Q1749243) (← links)
- Secrecy and group creation (Q1763430) (← links)
- Analysis of security protocols as open systems (Q1853583) (← links)
- Static analysis of topology-dependent broadcast networks (Q2266988) (← links)
- A control flow analysis for Beta-binders with and without static compartments (Q2271446) (← links)
- Automated verification of selected equivalences for security protocols (Q2474047) (← links)
- A static analysis of cryptographic processes: the denotational approach (Q2484412) (← links)
- Cryptographic Analysis in Cubic Time (Q2841271) (← links)
- Techniques for Security Checking (Q2841279) (← links)
- A Static Analysis for Beta-Binders (Q2870298) (← links)
- Approximating Probabilistic Behaviors of Biological Systems Using Abstract Interpretation (Q5404082) (← links)
- Control Flow Analysis of Generalised Boolean Networks (Q5404092) (← links)