The Applied Pi Calculus
From MaRDI portal
Publication:3177888
DOI10.1145/3127586zbMath1426.68037arXiv1609.03003OpenAlexW2522035104MaRDI QIDQ3177888
Martín Abadi, Bruno Blanchet, Cédric Fournet
Publication date: 2 August 2018
Published in: Journal of the ACM (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1609.03003
Data encryption (aspects in computer science) (68P25) Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85) Mathematical aspects of software engineering (specification, verification, metrics, requirements, etc.) (68N30)
Related Items (17)
Compositional analysis of protocol equivalence in the applied \(\pi \)-calculus using quasi-open bisimilarity ⋮ Trace Equivalence and Epistemic Logic to Express Security Properties ⋮ When privacy fails, a formula describes an attack: a complete and compositional verification method for the applied \(\pi\)-calculus ⋮ Implementation of a reversible distributed calculus ⋮ A PO characterisation of reconfiguration ⋮ Unnamed Item ⋮ Unnamed Item ⋮ Unnamed Item ⋮ Unnamed Item ⋮ Unnamed Item ⋮ A process calculus approach to detection and mitigation of PLC malware ⋮ Persistent Stochastic Non-Interference ⋮ Explicit Identifiers and Contexts in Reversible Concurrent Calculus ⋮ The \(C_\pi\)-calculus: a model for confidential name passing ⋮ A calculus for collective-adaptive systems and its behavioural theory ⋮ Processes against tests: on defining contextual equivalences ⋮ Unnamed Item
Uses Software
This page was built for publication: The Applied Pi Calculus