Secrecy types for asymmetric communication
暂无分享,去创建一个
[1] Christoph Weidenbach,et al. Towards an Automatic Analysis of Security Protocols in First-Order Logic , 1999, CADE.
[2] Martín Abadi,et al. Secrecy by typing in security protocols , 1999, JACM.
[3] Nobuko Yoshida,et al. Secure Information Flow as Typed Process Behaviour , 2000, ESOP.
[4] James Riely,et al. Information flow vs. resource access in the asynchronous pi-calculus , 2000, TOPL.
[5] John C. Mitchell,et al. A meta-notation for protocol analysis , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[6] Patrick Brézillon,et al. Lecture Notes in Artificial Intelligence , 1999 .
[7] Jon G. Riecke,et al. The SLam calculus: programming with secrecy and integrity , 1998, POPL '98.
[8] Andrew C. Myers,et al. JFlow: practical mostly-static information flow control , 1999, POPL '99.
[9] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[10] Cédric Fournet,et al. The reflexive CHAM and the join-calculus , 1996, POPL '96.
[11] Luca Cardelli,et al. Secrecy and group creation , 2005, Inf. Comput..
[12] Robin Milner,et al. A Calculus of Mobile Processes, II , 1992, Inf. Comput..
[13] Andrew D. Gordon,et al. Authenticity by typing for security protocols , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[14] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[15] James Riely,et al. Information Flow vs. Resource Access in the Asynchronous Pi-Calculus , 2000, ICALP.
[16] James Riely,et al. Trust and partial typing in open systems of mobile agents , 1999, POPL '99.
[17] Ross J. Anderson,et al. Robustness Principles for Public Key Protocols , 1995, CRYPTO.
[18] Sylvain Conchon,et al. Information flow inference for free , 2000, ICFP '00.
[19] Jonathan K. Millen,et al. Protocol-independent secrecy , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[20] Davide Sangiorgi,et al. On asynchrony in name-passing calculi , 1998, Mathematical Structures in Computer Science.
[21] K. Rustan M. Leino,et al. A semantic approach to secure information flow , 2000, Sci. Comput. Program..
[22] Susan S. Owicki,et al. Network objects , 1995 .
[23] Igor Walukiewicz,et al. On Term Rewriting Systems Having a Rational Derivation , 2004, FoSSaCS.
[24] Martín Abadi,et al. Secrecy Types for Asymmetric Communication , 2001, FoSSaCS.
[25] Geoffrey Smith,et al. A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..
[26] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[27] Jonathan K. Millen,et al. Three systems for cryptographic protocol analysis , 1994, Journal of Cryptology.
[28] Martín Abadi,et al. Prudent Engineering Practice for Cryptographic Protocols , 1994, IEEE Trans. Software Eng..
[29] Andrew C. Myers,et al. A decentralized model for information flow control , 1997, SOSP.
[30] Martín Abadi,et al. A Calculus for Cryptographic Protocols: The spi Calculus , 1999, Inf. Comput..
[31] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[32] Anna Philippou,et al. Tools and Algorithms for the Construction and Analysis of Systems , 2018, Lecture Notes in Computer Science.
[33] Lawrence C. Paulson,et al. The Inductive Approach to Verifying Cryptographic Protocols , 2021, J. Comput. Secur..
[34] Robin Milner,et al. A Calculus of Mobile Processes, II , 1992, Inf. Comput..
[35] Martín Abadi,et al. A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.
[36] Bruno Blanchet,et al. An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[37] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[38] Flemming Nielson,et al. Control Flow Analysis for the pi-calculus , 1998, CONCUR.
[39] Martn Abadi,et al. Security Protocols and their Properties , 2000 .