메뉴 건너뛰기




Volumn 2171 LNCS, Issue , 2001, Pages 262-330

Notes on nominal calculi for security and mobility

Author keywords

[No Author keywords available]

Indexed keywords

BIOMINERALIZATION; DIFFERENTIATION (CALCULUS); PATHOLOGY; SECURITY SYSTEMS;

EID: 23044531604     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45608-2_5     Document Type: Conference Paper
Times cited : (27)

References (91)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • September, 289, 323
    • [Aba99] M. Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749–786, September 1999. 289, 323
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 3
    • 0035035153 scopus 로고    scopus 로고
    • 28th ACM Symposium on Principles of Programming Languages (POPL’01), 288, 289
    • [AF01] M. Abadi and C. Fournet. Mobile values, new names, and secure communication. In 28th ACM Symposium on Principles of Programming Languages (POPL’01), pages 104–115, 2001. 288, 289
    • (2001) Mobile Values, New Names, and Secure Communication , pp. 104-115
    • Abadi, M.1    Fournet, C.2
  • 5
    • 0000298407 scopus 로고    scopus 로고
    • A bisimulation method for cryptographic protocols
    • 289
    • [AG98] M. Abadi and A. D. Gordon. A bisimulation method for cryptographic protocols. Nordic Journal of Computing, 5:267–303, 1998. 289
    • (1998) Nordic Journal of Computing , vol.5 , pp. 267-303
    • Abadi, M.1    Gordon, A.D.2
  • 6
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • An extended version with full proofs appears as Digital Equipment Corporation Systems Research Center report No. 149, January 1998. 264, 266
    • [AG99] M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148:1–70, 1999. An extended version with full proofs appears as Digital Equipment Corporation Systems Research Center report No. 149, January 1998. 264, 266
    • (1999) Information and Computation , vol.148 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 8
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • 281
    • [AN96] M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6– 15,January 1996. 281
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 10
    • 84958762859 scopus 로고
    • The game of the name in cryptographic tables
    • Lectures Notes in Computer Science, Springer, 289
    • [AP99] R. Amadio and S. Prasad. The game of the name in cryptographic tables. In Advances in Computing Science (ASIAN’99), volume 1742 of Lectures Notes in Computer Science, pages 5–26. Springer, 1999. 289
    • (1742) Advances in Computing Science (ASIAN’99) , pp. 5-26
    • Amadio, R.1    Prasad, S.2
  • 11
    • 84879078812 scopus 로고
    • Reconciling two views of cryptography
    • Lectures Notes in Computer Science, Springer, 273
    • [AR00] M. Abadi and P. Rogaway. Reconciling two views of cryptography. In Theoretical Computer Science (IFIP TCS 2000), volume 1872 of Lectures Notes in Computer Science, pages 3–33. Springer, 2000. 273
    • (1872) Theoretical Computer Science (IFIP TCS 2000) , pp. 3-33
    • Abadi, M.1    Rogaway, P.2
  • 15
    • 84945976575 scopus 로고    scopus 로고
    • Control flow analysis for the π-calculus
    • Lecture Notes in Computer Science, Springer, 323
    • [BDNN98] C. Bodei, P. Degano, F. Nielson, and H. Nielson. Control flow analysis for the π-calculus. In CONCUR’98: Concurrency Theory, volume 1466 of Lecture Notes in Computer Science, pages 84–98. Springer, 1998. 323
    • (1998) CONCUR’98: Concurrency Theory , vol.1466 , pp. 84-98
    • Bodei, C.1    Degano, P.2    Nielson, F.3    Nielson, H.4
  • 16
    • 0000036723 scopus 로고
    • Testing equivalence for mobile processes
    • August, 272, 286
    • [BN95] M. Boreale and R. De Nicola. Testing equivalence for mobile processes. Information and Computation, 120(2):279–303, August 1995. 272, 286
    • (1995) Information and Computation , vol.120 , Issue.2 , pp. 279-303
    • Boreale, M.1    de Nicola, R.2
  • 18
    • 0004135552 scopus 로고    scopus 로고
    • Addison-Wesley, 263
    • [Box98] D. Box. Essential COM. Addison-Wesley, 1998. 263
    • (1998) Essential COM
    • Box, D.1
  • 20
    • 0035733596 scopus 로고    scopus 로고
    • The JavaSeal mobile agent kernel
    • To appear. A preliminary version appears in the proceedings of the 3rd International Symposium on Mobile Agents (MA/ASA’99), 1999. 266
    • [BV01] C. Bryce and J. Vitek. The JavaSeal mobile agent kernel. Agent Systems Journal, 2001. To appear. A preliminary version appears in the proceedings of the 3rd International Symposium on Mobile Agents (MA/ASA’99), 1999. 266
    • (2001) Agent Systems Journal
    • Bryce, C.1    Vitek, J.2
  • 21
    • 0029631979 scopus 로고
    • A language with distributed scope
    • 265, 292
    • [Car95] L. Cardelli. A language with distributed scope. Computing Systems, 8(1):27–59, January 1995. 265, 292
    • (1995) Computing Systems , vol.8 , Issue.1 , pp. 27-59
    • Cardelli, L.1
  • 22
    • 0003757373 scopus 로고    scopus 로고
    • SRC Technical Note 1997– 013, Digital Equipment Corporation Systems Research Center, 325
    • [Car97] L. Cardelli. Mobile ambient synchronization. SRC Technical Note 1997– 013, Digital Equipment Corporation Systems Research Center, July 1997. 325
    • (1997) Mobile Ambient Synchronization
    • Cardelli, L.1
  • 23
    • 84982993891 scopus 로고    scopus 로고
    • Abstractions for mobile computation
    • C. Jensen and J. Vitek, Lecture Notes in Computer Science, Springer, 265, 324
    • [Car99] L. Cardelli. Abstractions for mobile computation. In C. Jensen and J. Vitek, editors, Secure Internet Programming: Issues in Distributed and Mobile Object Systems, volume 1603 of Lecture Notes in Computer Science, pages 51–94. Springer, 1999. 265, 324
    • (1999) Secure Internet Programming: Issues in Distributed and Mobile Object Systems , vol.1603 , pp. 51-94
    • Cardelli, L.1
  • 26
    • 0032670228 scopus 로고    scopus 로고
    • 26th ACM Symposium on Principles of Programming Languages (POPL’99), 266, 298, 317, 324
    • [CG99] L. Cardelli and A. D. Gordon. Types for mobile ambients. In 26th ACM Symposium on Principles of Programming Languages (POPL’99), pages 79–92, January 1999. 266, 298, 317, 324
    • (1999) Types for Mobile Ambients , pp. 79-92
    • Cardelli, L.1    Gordon, A.D.2
  • 28
    • 0001525319 scopus 로고    scopus 로고
    • Mobile ambients
    • 265, 266, 294, 297, 324
    • [CG00b] L. Cardelli and A. D. Gordon. Mobile ambients. Theoretical Computer Science, 240:177–213, 2000. 265, 266, 294, 297, 324
    • (2000) Theoretical Computer Science , vol.240 , pp. 177-213
    • Cardelli, L.1    Gordon, A.D.2
  • 29
    • 0005505928 scopus 로고    scopus 로고
    • Logical properties of name restriction
    • Lecture Notes in Computer Science. Springer, To appear. 324
    • [CG01] L. Cardelli and A. D. Gordon. Logical properties of name restriction. In Typed Lambda Calculi and Applications (TLCA’01), Lecture Notes in Computer Science. Springer, 2001. To appear. 324
    • (2001) Typed Lambda Calculi and Applications (TLCA’01)
    • Cardelli, L.1    Gordon, A.D.2
  • 30
    • 84887502600 scopus 로고    scopus 로고
    • 26th International Colloquium on Automata, Languages and Programming (ICALP’99), Lecture Notes in Computer Science, Springer, 322, 324
    • [CGG99] L. Cardelli, G. Ghelli, and A. D. Gordon. Mobility types for mobile ambients. In 26th International Colloquium on Automata, Languages and Programming (ICALP’99), volume 1644 of Lecture Notes in Computer Science, pages 230–239. Springer, 1999. 322, 324
    • (1999) Mobility Types for Mobile Ambients , vol.1644 , pp. 230-239
    • Cardelli, L.1    Ghelli, G.2    Gordon, A.D.3
  • 31
    • 84879087677 scopus 로고    scopus 로고
    • Ambient groups and mobility types
    • Lecture Notes in Computer Science, Springer, 266, 324
    • [CGG00a] L. Cardelli, G. Ghelli, and A. D. Gordon. Ambient groups and mobility types. In Theoretical Computer Science (IFIP TCS 2000), volume 1872 of Lecture Notes in Computer Science, pages 333–347. Springer, 2000. 266, 324
    • (2000) Theoretical Computer Science (IFIP TCS 2000) , vol.1872 , pp. 333-347
    • Cardelli, L.1    Ghelli, G.2    Gordon, A.D.3
  • 32
    • 84865445501 scopus 로고    scopus 로고
    • Group creation and secrecy
    • C. Palamidessi, editor, Lecture Notes in Computer Science, Springer, 323
    • [CGG00b] L. Cardelli, G. Ghelli, and A. D. Gordon. Group creation and secrecy. In C. Palamidessi, editor, CONCUR 2000—Concurrency Theory, volume 1877 of Lecture Notes in Computer Science, pages 365–379. Springer, 2000. 323
    • (2000) CONCUR 2000—Concurrency Theory , vol.1877 , pp. 365-379
    • Cardelli, L.1    Ghelli, G.2    Gordon, A.D.3
  • 33
    • 84958963801 scopus 로고
    • Bauhaus linda
    • P. Ciancarini, O. Nierstrasz, and A. Yonezawa, editors, Lecture Notes in Computer Science, Springer, 292
    • [CGZ95] N. Carriero, D. Gelernter, and L. Zuck. Bauhaus linda. In P. Ciancarini, O. Nierstrasz, and A. Yonezawa, editors, Object-Based Models and Languages for Concurrent Systems, volume 924 of Lecture Notes in Computer Science, pages 66–76. Springer, 1995. 292
    • (1995) Object-Based Models and Languages for Concurrent Systems , vol.924 , pp. 66-76
    • Carriero, N.1    Gelernter, D.2    Zuck, L.3
  • 34
    • 0023965424 scopus 로고
    • The calculus of constructions
    • 297
    • [CH88] T. Coquand and G. Huet. The calculus of constructions. Information and Computation, 76(2/3):95–120, February/March 1988. 297
    • (1988) Information and Computation , vol.76 , Issue.2-3 , pp. 95-120
    • Coquand, T.1    Huet, G.2
  • 35
    • 0004717076 scopus 로고    scopus 로고
    • Model checking mobile processes
    • 272
    • [Dam96] M. Dam. Model checking mobile processes. Information and Computation, 129(1):35–51, 1996. 272
    • (1996) Information and Computation , vol.129 , Issue.1 , pp. 35-51
    • Dam, M.1
  • 36
    • 0031601027 scopus 로고    scopus 로고
    • 31st Hawaii International Conference on System Sciences, 272
    • [Dam98] M. Dam. Proving trust in systems of second-order processes. In 31st Hawaii International Conference on System Sciences, volume VII, pages 255–264, 1998. 272
    • (1998) Proving Trust in Systems of Second-Order Processes , vol.7 , pp. 255-264
    • Dam, M.1
  • 37
    • 85045310540 scopus 로고
    • National Bureau of Standards, Washington DC, January, 274
    • [DES77] Data encryption standard. Fed. Inform. Processing Standards Pub. 46, National Bureau of Standards, Washington DC, January 1977. 274
    • (1977) Fed. Inform. Processing Standards Pub. 46
  • 38
    • 84982908771 scopus 로고    scopus 로고
    • Secure Internet Programming 1999, Lecture Notes in Computer Science, Springer, 323
    • [DFP99] R. De Nicola, G. Ferrari, and R. Pugliese. Types as specifications of access policies. In Secure Internet Programming 1999, volume 1603 of Lecture Notes in Computer Science, pages 117–146. Springer, 1999. 323
    • (1999) Types as Specifications of Access Policies , vol.1603 , pp. 117-146
    • de Nicola, R.1    Ferrari, G.2    Pugliese, R.3
  • 39
    • 18944399713 scopus 로고    scopus 로고
    • Region analysis and a π-calculus with groups
    • Lectures Notes in Computer Science, 324
    • [DG00] S. Dal Zilio and A. D. Gordon. Region analysis and a π-calculus with groups. In Mathematical Foundations of Computer Science 2000 (MFCS2000), volume 1893 of Lectures Notes in Computer Science, pages 1–21. Springer, 2000. 324
    • (2000) Mathematical Foundations of Computer Science 2000 (MFCS2000) , vol.1893 , pp. 1-21
    • Dal Zilio, S.1    Gordon, A.D.2
  • 42
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • 264
    • [DS81] D. E. Denning and G. M. Sacco. Timestamps in key distribution protocols. Communications of the ACM, 24(8):533–536, 1981. 264
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.E.1    Sacco, G.M.2
  • 43
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • 273
    • [DY83] D. Dolev and A. C. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT–29(2):198–208, 1983. 273
    • (1983) IEEE Transactions on Information Theory , vol.IT29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 44
    • 84974776068 scopus 로고
    • A classification of security properties for process algebra
    • 273
    • [FG94] R. Focardi and R. Gorrieri. A classification of security properties for process algebra. Journal of Computer Security, 3(1):5–33, 1994. 273
    • (1994) Journal of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 45
    • 0029703268 scopus 로고    scopus 로고
    • 23rd ACM Symposium on Principles of Programming Languages (POPL’96), 264, 266, 293
    • [FG96] C. Fournet and G. Gonthier. The reflexive CHAM and the Join-calculus. In 23rd ACM Symposium on Principles of Programming Languages (POPL’96), pages 372–385, 1996. 264, 266, 293
    • (1996) The Reflexive CHAM and the Join-Calculus , pp. 372-385
    • Fournet, C.1    Gonthier, G.2
  • 46
    • 84955565479 scopus 로고    scopus 로고
    • CONCUR’96: Concurrency Theory, Lecture Notes in Computer Science, Springer, 266, 293
    • + 96] C. Fournet, G. Gonthier, J.-J. Lévy, L. Maranget, and D. Rémy. A calculus of mobile agents. In CONCUR’96: Concurrency Theory, volume 1119 of Lecture Notes in Computer Science, pages 406–421. Springer, 1996. 266, 293
    • (1996) A Calculus of Mobile Agents , vol.1119 , pp. 406-421
    • Fournet, C.1    Gonthier, G.2    Lévy, J.-J.3    Maranget, L.4    Rémy, D.5
  • 47
    • 84879070446 scopus 로고    scopus 로고
    • An asynchronous, distributed implementation of mobile ambients
    • Lecture Notes in Computer Science. Springer, 266, 325
    • [FLS00] C. Fournet, J.-J. Lévy, and A. Schmitt. An asynchronous, distributed implementation of mobile ambients. In Theoretical Computer Science (IFIP TCS 2000), volume 1872 of Lecture Notes in Computer Science. Springer, 2000. 266, 325
    • (2000) Theoretical Computer Science (IFIP TCS 2000) , vol.1872
    • Fournet, C.1    Lévy, J.-J.2    Schmitt, A.3
  • 48
    • 84937692789 scopus 로고    scopus 로고
    • Equational properties of mobile ambients
    • Lecture Notes in Computer Science, Springer, An extended version appears as Microsoft Research Technical Report MSR–TR–99–11, April 1999. 324
    • [GC99] A. D. Gordon and L. Cardelli. Equational properties of mobile ambients. In Foundations of Software Science and Computation Structures (FoSSaCS’99), volume 1578 of Lecture Notes in Computer Science, pages 212–226. Springer, 1999. An extended version appears as Microsoft Research Technical Report MSR–TR–99–11, April 1999. 324
    • (1999) Foundations of Software Science and Computation Structures (FoSSaCS’99) , vol.1578 , pp. 212-226
    • Gordon, A.D.1    Cardelli, L.2
  • 53
    • 84957649493 scopus 로고    scopus 로고
    • Abstract interpretation of mobile ambients
    • Lecture Notes in Computer Science, Springer, 323
    • [HJNN99] R. R. Hansen, J. G. Jensen, F. Nielson, and H. R. Nielson. Abstract interpretation of mobile ambients. In Static Analysis Symposium (SAS’99), volume 1694 of Lecture Notes in Computer Science, pages 134–148. Springer, 1999. 323
    • (1999) Static Analysis Symposium (SAS’99) , vol.1694 , pp. 134-148
    • Hansen, R.R.1    Jensen, J.G.2    Nielson, F.3    Nielson, H.R.4
  • 56
    • 0024665744 scopus 로고
    • Analyzing encryption protocols using formal verification techniques
    • 273
    • [Kem89] R. Kemmerer. Analyzing encryption protocols using formal verification techniques. IEEE Journal on Selected Areas in Communications, 7(4):448–457, 1989. 273
    • (1989) IEEE Journal on Selected Areas in Communications , vol.7 , Issue.4 , pp. 448-457
    • Kemmerer, R.1
  • 57
  • 58
    • 0042664779 scopus 로고
    • Authentication in distributed systems: A bibliography
    • 272
    • [Lie93] A. Liebl. Authentication in distributed systems: A bibliography. ACM Operating Systems Review, 27(4):31–41, 1993. 272
    • (1993) ACM Operating Systems Review , vol.27 , Issue.4 , pp. 31-41
    • Liebl, A.1
  • 60
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR
    • T. Margaria and B. Steffen, Lectures Notes in Computer Science, Springer, 264, 273
    • [Low96] G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR. In T. Margaria and B. Steffen, editors, Tools and Algorithms for the Construction and Analysis of Systems (TACAS’96), volume 1055 of Lectures Notes in Computer Science, pages 147–166. Springer, 1996. 264, 273
    • (1996) Tools and Algorithms for the Construction and Analysis of Systems (TACAS’96) , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 63
    • 0029718596 scopus 로고    scopus 로고
    • On two proposals for on-line bankcard payments using open networks: Problems and solutions
    • 289
    • [Mao96] W. Mao. On two proposals for on-line bankcard payments using open networks: Problems and solutions. In IEEE Symposium on Security and Privacy, pages 201–210, 1996. 289
    • (1996) IEEE Symposium on Security and Privacy , pp. 201-210
    • Mao, W.1
  • 65
    • 0342880800 scopus 로고
    • Applying formal methods to the analysis of a key management protocol
    • 273
    • [Mea92] C. Meadows. Applying formal methods to the analysis of a key management protocol. Journal of Computer Security, 1(1):5–36, 1992. 273
    • (1992) Journal of Computer Security , vol.1 , Issue.1 , pp. 5-36
    • Meadows, C.1
  • 69
    • 44049113210 scopus 로고
    • A calculus of mobile processes, parts I and II
    • 263, 272
    • [MPW92] R. Milner, J. Parrow, and D. Walker. A calculus of mobile processes, parts I and II. Information and Computation, pages 1–40 and 41–77, 1992. 263, 272
    • (1992) Information and Computation
    • Milner, R.1    Parrow, J.2    Walker, D.3
  • 72
    • 0347293739 scopus 로고
    • Names
    • S. Mullender, editor, Addison-Wesley, 263
    • [Nee89] R. M. Needham. Names. In S. Mullender, editor, Distributed Systems, pages 89–101. Addison-Wesley, 1989. 263
    • (1989) Distributed Systems , pp. 89-101
    • Needham, R.M.1
  • 73
    • 84957013187 scopus 로고    scopus 로고
    • Locality based linda: Programming with explicit localities
    • Lecture Notes in Computer Science, Springer, 293
    • [NFP97] R. De Nicola, G.-L. Ferrari, and R. Pugliese. Locality based linda: programming with explicit localities. In Proceedings TAPSOFT’97, volume 1214 of Lecture Notes in Computer Science, pages 712–726. Springer, 1997. 293
    • (1997) Proceedings TAPSOFT’97 , vol.1214 , pp. 712-726
    • de Nicola, R.1    Ferrari, G.-L.2    Pugliese, R.3
  • 74
    • 35048826704 scopus 로고    scopus 로고
    • Validating firewalls in mobile ambients
    • Lecture Notes in Computer Science, Springer, 323
    • [NNHJ99] F. Nielson, H. R. Nielson, R. R. Hansen, and J. G. Jensen. Validating firewalls in mobile ambients. In CONCUR’99: Concurrency Theory, volume 1664 of Lecture Notes in Computer Science, pages 463–477. Springer, 1999. 323
    • (1999) CONCUR’99: Concurrency Theory , vol.1664 , pp. 463-477
    • Nielson, F.1    Nielson, H.R.2    Hansen, R.R.3    Jensen, J.G.4
  • 75
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • [NS78] R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993– 999, 1978. 264, 272
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 76
    • 84947207579 scopus 로고    scopus 로고
    • Functional nets
    • Lecture Notes in Computer Science, Springer, 264
    • [Ode00] M. Odersky. Functional nets. In European Symposium on Programming (ESOP 2000), volume 1782 of Lecture Notes in Computer Science, pages 1–25. Springer, 2000. 264
    • (2000) European Symposium on Programming (ESOP 2000) , vol.1782 , pp. 1-25
    • Odersky, M.1
  • 78
    • 0003976893 scopus 로고    scopus 로고
    • G. Plotkin, C. Stirling, and M. Tofte, editors, Proof, Language and Interaction: Essays in Honour of Robin Milner. MIT Press, 264
    • [PT00] B. C. Pierce and D. N. Turner. Pict: A programming language based on the pi-calculus. In G. Plotkin, C. Stirling, and M. Tofte, editors, Proof, Language and Interaction: Essays in Honour of Robin Milner. MIT Press, 2000. 264
    • (2000) Pict: A Programming Language Based on the Pi-Calculus
    • Pierce, B.C.1    Turner, D.N.2
  • 80
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • 287
    • [RSA78] R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120–126, February 1978. 287
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 84
    • 84878539063 scopus 로고    scopus 로고
    • Global/local subtyping and capability inference for a distributed π-calculus
    • Lecture Notes in Computer Science, Springer, 292, 317, 323
    • [Sew98] P. Sewell. Global/local subtyping and capability inference for a distributed π-calculus. In 25th International Colloquium on Automata, Languages and Programming (ICALP’98), volume 1443 of Lecture Notes in Computer Science, pages 695–706. Springer, 1998. 292, 317, 323
    • (1998) 25Th International Colloquium on Automata, Languages and Programming (ICALP’98) , vol.1443 , pp. 695-706
    • Sewell, P.1
  • 86
    • 26444521881 scopus 로고    scopus 로고
    • The π-calculus: A Theory of Mobile Processes
    • 263, 272
    • [SW01] D. Sangiorgi and D. Walker. The π-calculus: a Theory of Mobile Processes. Cambridge University Press, 2001. 263, 272
    • (2001) Cambridge University Press
    • Sangiorgi, D.1    Walker, D.2
  • 87
    • 0002997049 scopus 로고    scopus 로고
    • Region-based memory management
    • 323
    • [TT97] M. Tofte and J.-P. Talpin. Region-based memory management. Information and Computation, 132(2):109–176, 1997. 323
    • (1997) Information and Computation , vol.132 , Issue.2 , pp. 109-176
    • Tofte, M.1    Talpin, J.-P.2
  • 88
    • 84956985232 scopus 로고    scopus 로고
    • Seal: A framework for secure mobile computations
    • Lecture Notes in Computer Science, 266
    • [VC99] J. Vitek and G. Castagna. Seal: A framework for secure mobile computations. In Internet Programming Languages, volume 1686 of Lecture Notes in Computer Science, pages 47–77. Springer, 1999. 266
    • (1999) Internet Programming Languages , vol.1686 , pp. 47-77
    • Vitek, J.1    Castagna, G.2
  • 89
    • 85045304011 scopus 로고    scopus 로고
    • J. Bradshaw, editor, Software Agents. AAAI Press/The MIT Press
    • [Whi96] J. E. White. Mobile agents. In J. Bradshaw, editor, Software Agents. AAAI Press/The MIT Press, 1996. 265, 292
    • (1996) Mobile Agents , vol.265 , pp. 292
    • White, J.E.1
  • 90
    • 0027205880 scopus 로고
    • A semantic model for authentication protocols
    • [WL93] T. Y. C. Woo and S. S. Lam. A semantic model for authentication protocols. In IEEE Symposium on Security and Privacy, pages 178–194, 1993. 289
    • (1993) IEEE Symposium on Security and Privacy , vol.289 , pp. 178-194
    • Woo, T.Y.C.1    Lam, S.S.2
  • 91
    • 84878623670 scopus 로고    scopus 로고
    • Subtyping and typing algorithms for mobile ambients
    • Lecture Notes in Computer Science, Springer, 300, 312, 324
    • [Zim00] P. Zimmer. Subtyping and typing algorithms for mobile ambients. In Foundations of Software Science and Computation Structures (FoS-SaCS’00), volume 1784 of Lecture Notes in Computer Science, pages 375– 390. Springer, 2000. 300, 312, 324
    • (2000) Foundations of Software Science and Computation Structures (FoS-SaCS’00) , vol.1784 , pp. 375-390
    • Zimmer, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.