Cryptographically-masked flows
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 1692932 (Why is no real title available?)
- scientific article; zbMATH DE number 1692935 (Why is no real title available?)
- scientific article; zbMATH DE number 1302836 (Why is no real title available?)
- scientific article; zbMATH DE number 1951605 (Why is no real title available?)
- scientific article; zbMATH DE number 1956551 (Why is no real title available?)
- scientific article; zbMATH DE number 1956552 (Why is no real title available?)
- CONCUR 2005 – Concurrency Theory
- Certification of programs for secure information flow
- Cryptographically-Masked Flows
- Fundamentals of Computation Theory
- On the computational soundness of cryptographically masked flows
- Secrecy by typing in security protocols
- Verifying secrets and relative secrecy
Cited in
(12)- Fundamentals of Computation Theory
- Implicit flows in malicious and nonmalicious code
- scientific article; zbMATH DE number 1956552 (Why is no real title available?)
- Secure guarded commands
- Towards a Type System for Security APIs
- Computational probabilistic non-interference
- Possibilistic information flow control in the presence of encrypted communication
- Cryptographically sound implementations for typed information-flow security
- On the computational soundness of cryptographically masked flows
- Cryptographically-Masked Flows
- All Secrets Great and Small
- Information and Communications Security
This page was built for publication: Cryptographically-masked flows
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q935463)