Secure implementation of channel abstractions
From MaRDI portal
Publication:1854520
DOI10.1006/inco.2002.3086zbMath1009.68084OpenAlexW2049618117MaRDI QIDQ1854520
Cédric Fournet, Georges Gonthier, Martín Abadi
Publication date: 14 January 2003
Published in: Information and Computation (Search for Journal in Brave)
Full work available at URL: https://semanticscholar.org/paper/1f04c16864f7ce4fb5910863ab97cd65364ea0b1
Data encryption (aspects in computer science) (68P25) Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85)
Related Items (7)
Private authentication ⋮ The role of concurrency in an evolutionary view of programming abstractions ⋮ Channel abstractions for network security ⋮ Distributed temporal logic for the analysis of security protocol models ⋮ A hierarchy of equivalences for asynchronous calculi ⋮ Bisimulations in the join-calculus ⋮ Primitives for authentication in process algebras.
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- The chemical abstract machine
- A calculus of mobile processes. II
- Testing equivalences for processes
- On reduction-based process semantics
- Proof of correctness of data representations
- Functions as processes
- Using encryption for authentication in large networks of computers
- Authentication primitives and their compilation
This page was built for publication: Secure implementation of channel abstractions