Secure implementation of channel abstractions
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 42752 (Why is no real title available?)
- scientific article; zbMATH DE number 1223738 (Why is no real title available?)
- scientific article; zbMATH DE number 1231619 (Why is no real title available?)
- scientific article; zbMATH DE number 1500645 (Why is no real title available?)
- scientific article; zbMATH DE number 954401 (Why is no real title available?)
- scientific article; zbMATH DE number 2090726 (Why is no real title available?)
- A calculus of mobile processes. II
- Authentication primitives and their compilation
- Functions as processes
- On reduction-based process semantics
- Proof of correctness of data representations
- Testing equivalences for processes
- The chemical abstract machine
- Using encryption for authentication in large networks of computers
Cited in
(11)- Implementing secure dependencies over a network by designing a distributed security subsystem
- Strong Separations Between Broadcast and Authenticated Channels
- Primitives for authentication in process algebras.
- Distributed temporal logic for the analysis of security protocol models
- Private authentication
- Secure implementations of typed channel abstractions
- Bisimulations in the join-calculus
- The role of concurrency in an evolutionary view of programming abstractions
- A hierarchy of equivalences for asynchronous calculi
- Channel abstractions for network security
- Cryptographically Sound Implementations for Communicating Processes
This page was built for publication: Secure implementation of channel abstractions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1854520)