-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
M. Abadi Secrecy by typing in security protocols J. ACM 46 5 1999 749 786
-
(1999)
J. ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
84937720349
-
Security protocols and specifications
-
Foundations of Software Science and Computation Structures (FOSSACS'99) Springer, Berlin
-
M. Abadi, Security protocols and specifications, in: Foundations of Software Science and Computation Structures (FOSSACS'99), vol. 1578 of Lecture Notes in Computer Science, Springer, Berlin, 1999, pp. 1-13
-
(1999)
Lecture Notes in Computer Science
, vol.1578
, pp. 1-13
-
-
Abadi, M.1
-
3
-
-
0037432692
-
Secrecy types for asymmetric communication
-
M. Abadi, and B. Blanchet Secrecy types for asymmetric communication Theoret. Comput. Sci. 298 3 2003 387 415
-
(2003)
Theoret. Comput. Sci.
, vol.298
, Issue.3
, pp. 387-415
-
-
Abadi, M.1
Blanchet, B.2
-
4
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
M. Abadi, and A.D. Gordon A calculus for cryptographic protocols: the spi calculus Inform. Comput. 148 1999 1 70
-
(1999)
Inform. Comput.
, vol.148
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
5
-
-
84945976575
-
Control flow analysis for the π-calculus
-
Concurrency Theory (Concur'98) Springer, Berlin
-
C. Bodei, P. Degano, F. Nielson, H. Riis Nielson, Control flow analysis for the π-calculus, in: Concurrency Theory (Concur'98), vol. 1466 of Lecture Notes in Computer Science, Springer, Berlin, 1998, pp. 84-98
-
(1998)
Lecture Notes in Computer Science
, vol.1466
, pp. 84-98
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Riis Nielson, H.4
-
6
-
-
84865445501
-
Secrecy and group creation
-
C. Palamidessi (Ed.), CONCUR 2000-Concurrency Theory Springer, Berlin
-
L. Cardelli, G. Ghelli, A.D. Gordon, Secrecy and group creation, in: C. Palamidessi (Ed.), CONCUR 2000-Concurrency Theory, vol. 1877 of Lecture Notes in Computer Science, Springer, Berlin, 2000, pp. 365-379
-
(2000)
Lecture Notes in Computer Science
, vol.1877
, pp. 365-379
-
-
Cardelli, L.1
Ghelli, G.2
Gordon, A.D.3
-
8
-
-
84930486749
-
Region analysis and a π-calculus with groups
-
S. Dal Zilio, and A.D. Gordon Region analysis and a π-calculus with groups J. Funct. Program. 12 3 2002 229 292
-
(2002)
J. Funct. Program.
, vol.12
, Issue.3
, pp. 229-292
-
-
Dal Zilio, S.1
Gordon, A.D.2
-
9
-
-
0016949746
-
A lattice model of secure information flow
-
D. Denning A lattice model of secure information flow Commun. ACM 19 5 1976 236 242
-
(1976)
Commun. ACM
, vol.19
, Issue.5
, pp. 236-242
-
-
Denning, D.1
-
10
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev, and A.C. Yao On the security of public key protocols IEEE Trans. Inform. Theory IC-29 12 1983 198 208
-
(1983)
IEEE Trans. Inform. Theory
, vol.9929
, Issue.12
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
11
-
-
23944501086
-
A new approach to abstract syntax with variable binding
-
M.J. Gabbay, and A.M. Pitts A new approach to abstract syntax with variable binding Formal Aspects Comput. 13 2002 341 363
-
(2002)
Formal Aspects Comput.
, vol.13
, pp. 341-363
-
-
Gabbay, M.J.1
Pitts, A.M.2
-
13
-
-
0008902378
-
The polyadic π-calculus: A tutorial
-
F.L. Bauer, W. Brauer, H. Schwichtenberg (Eds.) Marktoberdorf, 1991. Available as Technical Report ECS-LFCS-91-180, Department of Computer Science, University of Edinburgh, October Reprinted in Logic and Algebra of Specification, Springer, Berlin, 1993
-
R. Milner, The polyadic π-calculus: a tutorial, in: F.L. Bauer, W. Brauer, H. Schwichtenberg (Eds.), Proceedings of the International Summer School on Logic and Algebra of Specification, Marktoberdorf, 1991. Available as Technical Report ECS-LFCS-91-180, Department of Computer Science, University of Edinburgh, October 1991. Reprinted in Logic and Algebra of Specification, Springer, Berlin, 1993
-
(1991)
Proceedings of the International Summer School on Logic and Algebra of Specification
-
-
Milner, R.1
-
15
-
-
84957891289
-
Polarized name passing
-
Foundations of Software Technology and Theoretical Computer Science Springer, Berlin
-
M. Odersky, Polarized name passing, in: Foundations of Software Technology and Theoretical Computer Science, vol. 1026 of Lecture Notes in Computer Science, Springer, Berlin, 1995
-
(1995)
Lecture Notes in Computer Science
, vol.1026
-
-
Odersky, M.1
-
16
-
-
0001518312
-
Typing and subtyping for mobile processes
-
B. Pierce, and D. Sangiorgi Typing and subtyping for mobile processes Math. Struct. Comput. Sci. 6 5 1996 409 454
-
(1996)
Math. Struct. Comput. Sci.
, vol.6
, Issue.5
, pp. 409-454
-
-
Pierce, B.1
Sangiorgi, D.2
-
19
-
-
84878539063
-
Global/local subtyping and capability inference for a distributed π-calculus
-
25th International Colloquium on Automata, Languages, and Programming (ICALP'98) Springer, Berlin
-
P. Sewell, Global/local subtyping and capability inference for a distributed π-calculus, in: 25th International Colloquium on Automata, Languages, and Programming (ICALP'98), vol. 1443 of Lecture Notes in Computer Science, Springer, Berlin, 1998, pp. 695-706
-
(1998)
Lecture Notes in Computer Science
, vol.1443
, pp. 695-706
-
-
Sewell, P.1
-
20
-
-
0002997049
-
Region-based memory management
-
M. Tofte, and J.-P. Talpin Region-based memory management Inform. Comput. 132 2 1997 109 176
-
(1997)
Inform. Comput.
, vol.132
, Issue.2
, pp. 109-176
-
-
Tofte, M.1
Talpin, J.-P.2
-
21
-
-
84857367674
-
Principal typing-schemes in a polyadic π-calculus
-
CONCUR'93-Concurrency Theory Springer, Berlin
-
V.T. Vasconcelos, K. Honda, Principal typing-schemes in a polyadic π-calculus, in: CONCUR'93-Concurrency Theory, vol. 715 of Lecture Notes in Computer Science, Springer, Berlin, 1993, pp. 524-538
-
(1993)
Lecture Notes in Computer Science
, vol.715
, pp. 524-538
-
-
Vasconcelos, V.T.1
Honda, K.2
|