Secrecy and group creation
From MaRDI portal
Publication:1763430
DOI10.1016/j.ic.2004.08.003zbMath1101.68692OpenAlexW1585923090WikidataQ56982078 ScholiaQ56982078MaRDI QIDQ1763430
Luca Cardelli, Giorgio Ghelli, Andrew D. Gordon
Publication date: 22 February 2005
Published in: Information and Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ic.2004.08.003
Network design and communication in computer systems (68M10) Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85)
Related Items (3)
The \(C_\pi\)-calculus: a model for confidential name passing ⋮ A type system for Discretionary Access Control ⋮ A Chart Semantics for the Pi-Calculus
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Region-based memory management
- A new approach to abstract syntax with variable binding
- A calculus for cryptographic protocols: The spi calculus
- Static analysis for the \(\pi\)-calculus with applications to security
- Secrecy types for asymmetric communication.
- Types for the ambient calculus
- Polarized name passing
- Secrecy by typing in security protocols
- On the security of public key protocols
- A lattice model of secure information flow
- Region analysis and a π-calculus with groups
This page was built for publication: Secrecy and group creation