The following pages link to The Applied Pi Calculus (Q3177888):
Displaying 8 items.
- The \(C_\pi\)-calculus: a model for confidential name passing (Q1996859) (← links)
- Processes against tests: on defining contextual equivalences (Q2079681) (← links)
- Compositional analysis of protocol equivalence in the applied \(\pi \)-calculus using quasi-open bisimilarity (Q2119978) (← links)
- A process calculus approach to detection and mitigation of PLC malware (Q2235740) (← links)
- A calculus for collective-adaptive systems and its behavioural theory (Q2272994) (← links)
- (Q3384912) (← links)
- (Q3384915) (← links)
- When privacy fails, a formula describes an attack: a complete and compositional verification method for the applied \(\pi\)-calculus (Q6041667) (← links)