Security protocols as choreographies
From MaRDI portal
Publication:2154014
DOI10.1007/978-3-030-91631-2_5zbMath1499.94036OpenAlexW4205310003MaRDI QIDQ2154014
Rosario Giustolisi, Sebastian Mödersheim, Marco Carbone, Carsten Schuermann, Alessandro Bruni
Publication date: 13 July 2022
Full work available at URL: https://orbit.dtu.dk/en/publications/13355403-b681-442d-9e5e-d2239d8a164e
Cryptography (94A60) Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85)
Cites Work
- Unnamed Item
- A calculus of mobile processes. I
- Automated analysis of accountability
- Deadlock-freedom-by-design
- Multiparty Asynchronous Session Types
- The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
- Alice and Bob: Reconciling Formal Models and Implementation
- On the security of public key protocols
- Structured Communication-Centred Programming for Web Services
- Searching for Shapes in Cryptographic Protocols
This page was built for publication: Security protocols as choreographies