Security protocols as choreographies
From MaRDI portal
Publication:2154014
Recommendations
Cites work
- A calculus of mobile processes. I
- Alice and Bob: reconciling formal models and implementation
- Automated analysis of accountability
- Choreographies with secure boxes and compromised principals
- Deadlock-freedom-by-design, multiparty asynchronous global programming
- Multiparty Asynchronous Session Types
- On the security of public key protocols
- Searching for Shapes in Cryptographic Protocols
- Structured Communication-Centred Programming for Web Services
- The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
This page was built for publication: Security protocols as choreographies
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2154014)