Nominal calculi for security and mobility
暂无分享,去创建一个
[1] Jean-Jacques Lévy,et al. A Calculus of Mobile Agents , 1996, CONCUR.
[2] Cliff B. Jones. A pi-Calculus Semantics for an Object-Based Design Notation , 1993, CONCUR.
[3] Faron Moller,et al. The Mobility Workbench - A Tool for the pi-Calculus , 1994, CAV.
[4] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[5] Davide Sangiorgi. An Interpretation of Typed Objects into Typed pi-Calculus , 1998, Inf. Comput..
[6] Benjamin C. Pierce,et al. Concurrent Objects in a Process Calculus , 1994, Theory and Practice of Parallel Programming.
[7] Mario Tokoro,et al. On Asynchronous Communication Semantics , 1991, Object-Based Concurrent Computing.
[8] Cédric Fournet,et al. The reflexive CHAM and the join-calculus , 1996, POPL '96.
[9] Martín Abadi,et al. A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.
[10] David Walker,et al. Objects in the pi-Calculus , 1992, Inf. Comput..
[11] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[12] Sarfraz Khurshid,et al. Is the Java Type System Sound? , 1999, Theory Pract. Object Syst..
[13] R. Amadio,et al. Localities and Failures , 1995 .
[14] Lawrence C. Paulson,et al. Proving properties of security protocols by induction , 1997, Proceedings 10th Computer Security Foundations Workshop.
[15] Davide Sangiorgi,et al. Expressing mobility in process algebras : first-order and higher-order paradigms , 1993 .
[16] Roberto M. Amadio. An Asynchronous Model of Locality, Failurem and Process Mobility , 1997, COORDINATION.