A static analysis of cryptographic processes: the denotational approach
From MaRDI portal
Publication:2484412
Recommendations
Cites work
- scientific article; zbMATH DE number 1617321 (Why is no real title available?)
- scientific article; zbMATH DE number 1670841 (Why is no real title available?)
- scientific article; zbMATH DE number 3725683 (Why is no real title available?)
- scientific article; zbMATH DE number 1231615 (Why is no real title available?)
- scientific article; zbMATH DE number 1231689 (Why is no real title available?)
- scientific article; zbMATH DE number 1086714 (Why is no real title available?)
- scientific article; zbMATH DE number 1948406 (Why is no real title available?)
- scientific article; zbMATH DE number 1953026 (Why is no real title available?)
- scientific article; zbMATH DE number 1487854 (Why is no real title available?)
- scientific article; zbMATH DE number 1507234 (Why is no real title available?)
- scientific article; zbMATH DE number 1538026 (Why is no real title available?)
- scientific article; zbMATH DE number 1754628 (Why is no real title available?)
- scientific article; zbMATH DE number 1759623 (Why is no real title available?)
- scientific article; zbMATH DE number 1759624 (Why is no real title available?)
- scientific article; zbMATH DE number 2087554 (Why is no real title available?)
- scientific article; zbMATH DE number 1834562 (Why is no real title available?)
- scientific article; zbMATH DE number 1884409 (Why is no real title available?)
- A Powerdomain Construction
- A calculus of mobile processes. II
- A denotational approach to the static analysis of cryptographic processes
- A domain equation for bisimulation
- A fully abstract denotational semantics for the \(\pi\)-calculus
- A fully abstract model for the \(\pi\)-calculus.
- A logic of authentication
- Analyzing security protocols with secrecy types and logic programs
- Occurrence counting analysis for the pi-calculus
- On the security of SPLICE/AS -- The authentication system in WIDE Internet
- On the security of recent protocols
- On the symbolic reduction of processes with cryptographic functions.
- Static analysis for the \(\pi\)-calculus with applications to security
- The \(\pi\)-calculus: A theory of mobile processes
- The security pi-calculus and non-interference
Cited in
(7)- MODELLING AND ANALYSIS OF PKI-BASED SYSTEMS USING PROCESS CALCULI
- Theoretical Computer Science
- Verification, Model Checking, and Abstract Interpretation
- Static evidences for attack reconstruction
- A denotational approach to the static analysis of cryptographic processes
- scientific article; zbMATH DE number 1834562 (Why is no real title available?)
- Static analysis for proactive security
This page was built for publication: A static analysis of cryptographic processes: the denotational approach
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2484412)