Secrecy and group creation
From MaRDI portal
Publication:1763430
DOI10.1016/j.ic.2004.08.003zbMath1101.68692MaRDI QIDQ1763430
Luca Cardelli, Andrew D. Gordon, Giorgio Ghelli
Publication date: 22 February 2005
Published in: Information and Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ic.2004.08.003
68M10: Network design and communication in computer systems
68Q85: Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.)
Related Items
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Region-based memory management
- A new approach to abstract syntax with variable binding
- A calculus for cryptographic protocols: The spi calculus
- Static analysis for the \(\pi\)-calculus with applications to security
- Secrecy types for asymmetric communication.
- Types for the ambient calculus
- Polarized name passing
- Secrecy by typing in security protocols
- On the security of public key protocols
- A lattice model of secure information flow
- Region analysis and a π-calculus with groups