Formally sound implementations of security protocols with JavaSPI
DOI10.1007/S00165-017-0449-8zbMATH Open1382.68027OpenAlexW2773994137MaRDI QIDQ1707348FDOQ1707348
Authors: Riccardo Sisto, Piergiuseppe Bettassa Copet, Matteo Avalle, Alfredo Pironti
Publication date: 29 March 2018
Published in: Formal Aspects of Computing (Search for Journal in Brave)
Full work available at URL: http://porto.polito.it/2695975/
Recommendations
Data encryption (aspects in computer science) (68P25) Specification and verification (program logics, model checking, etc.) (68Q60) Network protocols (68M12)
Cites Work
- Title not available (Why is that?)
- Mobile values, new names, and secure communication
- On the security of public key protocols
- Introduction to concurrency theory. Transition systems and CCS
- Secure Systems Development with UML
- Safe abstractions of data encodings in formal security protocol models
- Title not available (Why is that?)
- Proved generation of implementations from computationally secure protocol specifications
- Verified interoperable implementations of security protocols
Cited In (6)
Uses Software
This page was built for publication: Formally sound implementations of security protocols with JavaSPI
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1707348)