Secrecy and group creation
From MaRDI portal
Recommendations
- scientific article; zbMATH DE number 1759623
- Group anonymity
- Secret sharing in hierarchical groups
- scientific article; zbMATH DE number 1487488
- Hidden Group Structure
- Protocols for group oriented secret sharing
- Secrecy via Sources and Channels
- scientific article; zbMATH DE number 1189396
- Interactively secure groups from obfuscation
Cites work
- scientific article; zbMATH DE number 954809 (Why is no real title available?)
- scientific article; zbMATH DE number 1223731 (Why is no real title available?)
- scientific article; zbMATH DE number 1296290 (Why is no real title available?)
- scientific article; zbMATH DE number 1759623 (Why is no real title available?)
- A calculus for cryptographic protocols: The spi calculus
- A lattice model of secure information flow
- A new approach to abstract syntax with variable binding
- On the security of public key protocols
- Polarized name passing
- Region analysis and a π-calculus with groups
- Region-based memory management
- Secrecy by typing in security protocols
- Secrecy types for asymmetric communication.
- Static analysis for the \(\pi\)-calculus with applications to security
- The \(\pi\)-calculus: A theory of mobile processes
- Types for the ambient calculus
Cited in
(5)
This page was built for publication: Secrecy and group creation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1763430)