Computational Secrecy by Typing for the Pi Calculus
From MaRDI portal
Publication:5385600
DOI10.1007/11924661_16zbMath1168.68433OpenAlexW2127803066MaRDI QIDQ5385600
Martín Abadi, Ricardo Corin, Cédric Fournet
Publication date: 6 May 2008
Published in: Programming Languages and Systems (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11924661_16
Cryptography (94A60) Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85)
Related Items (3)
Linked data privacy ⋮ A survey of symbolic methods in computational analysis of cryptographic systems ⋮ Non-termination and secure information flow
This page was built for publication: Computational Secrecy by Typing for the Pi Calculus