Formally sound implementations of security protocols with JavaSPI
From MaRDI portal
Publication:1707348
DOI10.1007/s00165-017-0449-8zbMath1382.68027OpenAlexW2773994137MaRDI QIDQ1707348
Piergiuseppe Bettassa Copet, Alfredo Pironti, Riccardo Sisto, Matteo Avalle
Publication date: 29 March 2018
Published in: Formal Aspects of Computing (Search for Journal in Brave)
Full work available at URL: http://porto.polito.it/2695975/
Data encryption (aspects in computer science) (68P25) Specification and verification (program logics, model checking, etc.) (68Q60) Network protocols (68M12)
Related Items (1)
Uses Software
Cites Work
- Introduction to concurrency theory. Transition systems and CCS
- Safe abstractions of data encodings in formal security protocol models
- On the security of public key protocols
- Secure Systems Development with UML
- Mobile values, new names, and secure communication
- Proved Generation of Implementations from Computationally Secure Protocol Specifications
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Formally sound implementations of security protocols with JavaSPI