Security Abstractions and Intruder Models (Extended Abstract)
From MaRDI portal
Publication:5170668
DOI10.1016/J.ENTCS.2009.06.015zbMath1291.68249OpenAlexW2042153739WikidataQ62045686 ScholiaQ62045686MaRDI QIDQ5170668
Michele Bugliesi, Riccardo Focardi
Publication date: 23 July 2014
Published in: Electronic Notes in Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.entcs.2009.06.015
Specification and verification (program logics, model checking, etc.) (68Q60) Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85) Distributed systems (68M14)
Related Items (1)
Cites Work
- A calculus of mobile processes. II
- A calculus for cryptographic protocols: The spi calculus
- On reduction-based process semantics
- Private authentication
- Cryptographically sound implementations for typed information-flow security
- Cryptographically Sound Implementations for Communicating Processes
- On asynchrony in name-passing calculi
- Mobile values, new names, and secure communication
This page was built for publication: Security Abstractions and Intruder Models (Extended Abstract)