Static analysis for the \(\pi\)-calculus with applications to security
DOI10.1006/inco.2000.3020zbMath1007.68118OpenAlexW2002622794WikidataQ59416359 ScholiaQ59416359MaRDI QIDQ1854437
Hanne Riis Nielson, Pierpaolo Degano, Flemming Nielson, Chiara Bodei
Publication date: 14 January 2003
Published in: Information and Computation (Search for Journal in Brave)
Full work available at URL: https://semanticscholar.org/paper/f04100c06eb601057a96adc8a42472cb9443eaa7
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Specification and verification (program logics, model checking, etc.) (68Q60) Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85)
Related Items (20)
Uses Software
Cites Work
- Modal logics for mobile processes
- A calculus of mobile processes. II
- A calculus for cryptographic protocols: The spi calculus
- Mobile ambients
- Types for access control
- Secrecy by typing in security protocols
- Trust in the λ-calculus
- Systematic realisation of control flow analyses for CML
- Implicit typing à la ML for the join-calculus
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Static analysis for the \(\pi\)-calculus with applications to security