Pages that link to "Item:Q1854437"
From MaRDI portal
The following pages link to Static analysis for the \(\pi\)-calculus with applications to security (Q1854437):
Displaying 20 items.
- A calculus of trustworthy ad hoc networks (Q470043) (← links)
- Weakening the perfect encryption assumption in Dolev-Yao adversaries (Q557896) (← links)
- From flow logic to static type systems for coordination languages (Q967521) (← links)
- A theory of structural stationarity in the \(\pi\)-calculus (Q1014276) (← links)
- Validating firewalls using flow logics (Q1603656) (← links)
- A monotone framework for CCS (Q1749243) (← links)
- Secrecy and group creation (Q1763430) (← links)
- Analysis of security protocols as open systems (Q1853583) (← links)
- Static analysis of topology-dependent broadcast networks (Q2266988) (← links)
- A control flow analysis for Beta-binders with and without static compartments (Q2271446) (← links)
- Automated verification of selected equivalences for security protocols (Q2474047) (← links)
- A static analysis of cryptographic processes: the denotational approach (Q2484412) (← links)
- Cryptographic Analysis in Cubic Time (Q2841271) (← links)
- Techniques for Security Checking (Q2841279) (← links)
- A Static Analysis for Beta-Binders (Q2870298) (← links)
- MODELLING AND ANALYSIS OF PKI-BASED SYSTEMS USING PROCESS CALCULI (Q3444848) (← links)
- Pierpaolo Degano (Q3460854) (← links)
- Relational Analysis of Correlation (Q3522059) (← links)
- Approximating Probabilistic Behaviors of Biological Systems Using Abstract Interpretation (Q5404082) (← links)
- Control Flow Analysis of Generalised Boolean Networks (Q5404092) (← links)