Security Abstractions and Intruder Models (Extended Abstract)
暂无分享,去创建一个
[1] Simon L. Peyton Jones,et al. Imperative functional programming , 1993, POPL '93.
[2] Martín Abadi,et al. Mobile values, new names, and secure communication , 2001, POPL '01.
[3] Cédric Fournet,et al. Cryptographically Sound Implementations for Communicating Processes , 2006, ICALP.
[4] Martín Abadi,et al. A Calculus for Cryptographic Protocols: The spi Calculus , 1999, Inf. Comput..
[5] Robin Milner,et al. A Calculus of Mobile Processes, II , 1992, Inf. Comput..
[6] Nobuko Yoshida,et al. On Reduction-Based Process Semantics , 1995, Theor. Comput. Sci..
[7] Martín Abadi,et al. A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.
[8] Martín Abadi,et al. Private authentication , 2004, Theor. Comput. Sci..
[9] Cédric Fournet,et al. Cryptographically sound implementations for typed information-flow security , 2008, POPL '08.
[10] Davide Sangiorgi,et al. On asynchrony in name-passing calculi , 1998, Mathematical Structures in Computer Science.
[11] Cédric Fournet,et al. Secure Implementations for Typed Session Abstractions , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).
[12] Michele Bugliesi,et al. Language Based Secure Communication , 2008, 2008 21st IEEE Computer Security Foundations Symposium.
[13] Peeter Laud,et al. Secrecy types for a simulatable cryptographic library , 2005, CCS '05.