Pattern-matching spi-calculus
From MaRDI portal
Publication:2500522
Recommendations
Cites work
- scientific article; zbMATH DE number 1670808 (Why is no real title available?)
- scientific article; zbMATH DE number 1701344 (Why is no real title available?)
- scientific article; zbMATH DE number 1962753 (Why is no real title available?)
- scientific article; zbMATH DE number 1962758 (Why is no real title available?)
- scientific article; zbMATH DE number 1927582 (Why is no real title available?)
- scientific article; zbMATH DE number 1746674 (Why is no real title available?)
- A calculus for cryptographic protocols: The spi calculus
- A logic of authentication
- Analysis of security protocols as open systems
- Analyzing security protocols with secrecy types and logic programs
- CONCUR 2005 – Concurrency Theory
- CONCUR 2005 – Concurrency Theory
- Mobile values, new names, and secure communication
- On the security of public key protocols
- Resolution of equations in algebraic structures. Volume II: Rewriting techniques
- Secrecy by typing in security protocols
- Security protocols and their properties
Cited in
(8)- On the semantics of Alice \& Bob specifications of security protocols
- A formal semantics for protocol narrations
- Implementing Spi Calculus Using Nominal Techniques
- Types for Secure Pattern Matching with Local Knowledge in Universal Concurrent Constraint Programming
- A sorted semantic framework for applied process calculi (extended abstract)
- Expressiveness of concurrent intensionality
- Automated type-based analysis of injective agreement in the presence of compromised principals
- scientific article; zbMATH DE number 1962753 (Why is no real title available?)
This page was built for publication: Pattern-matching spi-calculus
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2500522)