Pages that link to "Item:Q3158557"
From MaRDI portal
The following pages link to Secrecy by typing in security protocols (Q3158557):
Displaying 19 items.
- Automated type-based analysis of injective agreement in the presence of compromised principals (Q492914) (← links)
- Weakening the perfect encryption assumption in Dolev-Yao adversaries (Q557896) (← links)
- Security types preserving compilation (Q865705) (← links)
- Cryptographically-masked flows (Q935463) (← links)
- Linearity and bisimulation (Q997996) (← links)
- Noninterference for concurrent programs and thread systems (Q1603688) (← links)
- Controlling file access with types (Q1744439) (← links)
- Secrecy and group creation (Q1763430) (← links)
- Analysing input/output-capabilities of mobile processes with a generic type system (Q1772312) (← links)
- Analysis of security protocols as open systems (Q1853583) (← links)
- Static analysis for the \(\pi\)-calculus with applications to security (Q1854437) (← links)
- Secrecy types for asymmetric communication. (Q1874278) (← links)
- Automated verification of selected equivalences for security protocols (Q2474047) (← links)
- Types for the ambient calculus (Q2497144) (← links)
- Pattern-matching spi-calculus (Q2500522) (← links)
- Type-based information flow analysis for the \(\pi\)-calculus (Q2581011) (← links)
- Cryptographic Analysis in Cubic Time (Q2841271) (← links)
- Techniques for Security Checking (Q2841279) (← links)
- Typed ψ-calculi (Q3090835) (← links)