Security protocols: from linear to classical logic by abstract interpretation
From MaRDI portal
Publication:1041815
DOI10.1016/J.IPL.2005.05.011zbMATH Open1185.68310OpenAlexW2006805613MaRDI QIDQ1041815FDOQ1041815
Authors: Bruno Blanchet
Publication date: 4 December 2009
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2005.05.011
Recommendations
- Encryption as an abstract data-type (extended abstract)
- scientific article; zbMATH DE number 1962760
- Analyzing security protocols with secrecy types and logic programs
- Analyzing security protocols with secrecy types and logic programs
- Abstract interpretation for proving secrecy properties in security protocols
Cites Work
Cited In (8)
- Linearity, persistence and testing semantics in the asynchronous pi-calculus
- Title not available (Why is that?)
- Title not available (Why is that?)
- Abstract State Machines 2004. Advances in Theory and Practice
- On the relationships between models in protocol verification
- Automated verification of selected equivalences for security protocols
- Encryption as an abstract data-type (extended abstract)
- Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif
This page was built for publication: Security protocols: from linear to classical logic by abstract interpretation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1041815)