Security protocols as choreographies
From MaRDI portal
Publication:2154014
DOI10.1007/978-3-030-91631-2_5zbMATH Open1499.94036OpenAlexW4205310003MaRDI QIDQ2154014FDOQ2154014
Rosario Giustolisi, Sebastian Mödersheim, Marco Carbone, Carsten Schürmann, Alessandro Bruni
Publication date: 13 July 2022
Full work available at URL: https://orbit.dtu.dk/en/publications/13355403-b681-442d-9e5e-d2239d8a164e
Cryptography (94A60) Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85)
Cites Work
- A calculus of mobile processes. I
- Multiparty Asynchronous Session Types
- Structured Communication-Centred Programming for Web Services
- Deadlock-freedom-by-design
- On the security of public key protocols
- Searching for Shapes in Cryptographic Protocols
- The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
- Automated analysis of accountability
- Alice and Bob: Reconciling Formal Models and Implementation
- Title not available (Why is that?)
This page was built for publication: Security protocols as choreographies
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2154014)