The following pages link to The Applied Pi Calculus (Q3177888):
Displaying 13 items.
- The \(C_\pi\)-calculus: a model for confidential name passing (Q1996859) (← links)
- Processes against tests: on defining contextual equivalences (Q2079681) (← links)
- Compositional analysis of protocol equivalence in the applied \(\pi \)-calculus using quasi-open bisimilarity (Q2119978) (← links)
- A process calculus approach to detection and mitigation of PLC malware (Q2235740) (← links)
- A calculus for collective-adaptive systems and its behavioural theory (Q2272994) (← links)
- (Q3384912) (← links)
- (Q3384915) (← links)
- (Q5009710) (← links)
- Trace Equivalence and Epistemic Logic to Express Security Properties (Q5041278) (← links)
- (Q5155663) (← links)
- Persistent Stochastic Non-Interference (Q5158656) (← links)
- Explicit Identifiers and Contexts in Reversible Concurrent Calculus (Q5162607) (← links)
- When privacy fails, a formula describes an attack: a complete and compositional verification method for the applied \(\pi\)-calculus (Q6041667) (← links)