Primitives for authentication in process algebras.
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 1670837 (Why is no real title available?)
- scientific article; zbMATH DE number 3967898 (Why is no real title available?)
- scientific article; zbMATH DE number 1739897 (Why is no real title available?)
- scientific article; zbMATH DE number 1950568 (Why is no real title available?)
- scientific article; zbMATH DE number 1487487 (Why is no real title available?)
- scientific article; zbMATH DE number 1531624 (Why is no real title available?)
- scientific article; zbMATH DE number 854547 (Why is no real title available?)
- scientific article; zbMATH DE number 1435985 (Why is no real title available?)
- A calculus for cryptographic protocols: The spi calculus
- A calculus of mobile processes. II
- Causality for debugging mobile agents
- From CML to its process algebra
- Names of the \(\pi\)-calculus agents handled locally
- Non-interleaving semantics for mobile processes
- Secure implementation of channel abstractions
- Three systems for cryptographic protocol analysis
Cited in
(10)- scientific article; zbMATH DE number 1962756 (Why is no real title available?)
- scientific article; zbMATH DE number 1696894 (Why is no real title available?)
- Pattern-matching spi-calculus
- Pierpaolo Degano
- Authentication primitives and their compilation
- Foundations of Security Analysis and Design II
- MODELLING AND ANALYSIS OF PKI-BASED SYSTEMS USING PROCESS CALCULI
- A comparison of three authentication properties.
- \textit{D\_PSNI}: delimited persistent stochastic non-interference
- Private authentication
This page was built for publication: Primitives for authentication in process algebras.
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1603653)