A static analysis of cryptographic processes: the denotational approach
From MaRDI portal
Publication:2484412
DOI10.1016/J.JLAP.2004.09.006zbMATH Open1078.68027OpenAlexW2057373006MaRDI QIDQ2484412FDOQ2484412
Authors: Yanyan Li
Publication date: 1 August 2005
Published in: The Journal of Logic and Algebraic Programming (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.jlap.2004.09.006
Recommendations
Cites Work
- Title not available (Why is that?)
- A calculus of mobile processes. II
- A Powerdomain Construction
- A domain equation for bisimulation
- On the security of recent protocols
- On the security of SPLICE/AS -- The authentication system in WIDE Internet
- The \(\pi\)-calculus: A theory of mobile processes
- A logic of authentication
- Title not available (Why is that?)
- A fully abstract model for the \(\pi\)-calculus.
- On the symbolic reduction of processes with cryptographic functions.
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Static analysis for the \(\pi\)-calculus with applications to security
- Occurrence counting analysis for the pi-calculus
- Title not available (Why is that?)
- A fully abstract denotational semantics for the \(\pi\)-calculus
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Analyzing security protocols with secrecy types and logic programs
- The security pi-calculus and non-interference
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- A denotational approach to the static analysis of cryptographic processes
- Title not available (Why is that?)
Cited In (7)
- MODELLING AND ANALYSIS OF PKI-BASED SYSTEMS USING PROCESS CALCULI
- Theoretical Computer Science
- Verification, Model Checking, and Abstract Interpretation
- Static evidences for attack reconstruction
- A denotational approach to the static analysis of cryptographic processes
- Title not available (Why is that?)
- Static analysis for proactive security
Uses Software
This page was built for publication: A static analysis of cryptographic processes: the denotational approach
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2484412)