Analysis of security protocols as open systems
From MaRDI portal
Publication:1853583
DOI10.1016/S0304-3975(02)00596-0zbMath1019.68039OpenAlexW2106613101WikidataQ114850211 ScholiaQ114850211MaRDI QIDQ1853583
Publication date: 21 January 2003
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/s0304-3975(02)00596-0
Related Items (7)
There are Two Sides to Every Question ⋮ Pattern-matching spi-calculus ⋮ Synthesis of secure adaptors ⋮ Formal models and analysis of secure multicast in wired and wireless networks ⋮ A comparison of three authentication properties. ⋮ A Uniform Framework for Security and Trust Modeling and Analysis with Crypto-CCS ⋮ Automated Synthesis of Enforcing Mechanisms for Security Properties in a Timed Setting
Cites Work
- Results on the propositional \(\mu\)-calculus
- A calculus of mobile processes. II
- A calculus for cryptographic protocols: The spi calculus
- A comparison of three authentication properties.
- Static analysis for the \(\pi\)-calculus with applications to security
- Testing equivalence for mobile processes
- Proof Techniques for Cryptographic Processes
- The NRL Protocol Analyzer: An Overview
- Secrecy by typing in security protocols
- On the security of public key protocols
- Compositionality Through an Operational Semantics of Contexts
- Shape analysis for mobile ambients
- A semantics for a logic of authentication (extended abstract)
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Analysis of security protocols as open systems