Security Abstractions and Intruder Models
暂无分享,去创建一个
[1] Nobuko Yoshida,et al. On Reduction-Based Process Semantics , 1995, Theor. Comput. Sci..
[2] Cédric Fournet,et al. Secure Implementations for Typed Session Abstractions , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).
[3] Michele Bugliesi,et al. Language Based Secure Communication , 2008, 2008 21st IEEE Computer Security Foundations Symposium.
[4] Martín Abadi,et al. Private authentication , 2004, Theor. Comput. Sci..
[5] Cédric Fournet,et al. Cryptographically sound implementations for typed information-flow security , 2008, POPL '08.
[6] Robin Milner,et al. A Calculus of Mobile Processes, II , 1992, Inf. Comput..
[7] Martín Abadi,et al. A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.
[8] Davide Sangiorgi,et al. On asynchrony in name-passing calculi , 1998, Mathematical Structures in Computer Science.
[9] Martín Abadi,et al. Mobile values, new names, and secure communication , 2001, POPL '01.
[10] Cédric Fournet,et al. Cryptographically Sound Implementations for Communicating Processes , 2006, ICALP.
[11] Peeter Laud,et al. Secrecy types for a simulatable cryptographic library , 2005, CCS '05.