-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
Sept.
-
M. Abadi. Secrecy by typing in security protocols. J. ACM, 46(5):749-786, Sept. 1999.
-
(1999)
J. ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
0002652530
-
Security protocols and their properties
-
IOS Press, Amsterdam
-
M. Abadi. Security protocols and their properties. In Foundations of Secure Computation, pages 39-60. IOS Press, Amsterdam, 2000.
-
(2000)
Foundations of Secure Computation
, pp. 39-60
-
-
Abadi, M.1
-
3
-
-
0037432692
-
Secrecy types for asymmetric communication
-
M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. Theoretical Comput. Sci., 298(3):387-415, 2003.
-
(2003)
Theoretical Comput. Sci.
, vol.298
, Issue.3
, pp. 387-415
-
-
Abadi, M.1
Blanchet, B.2
-
4
-
-
23144463868
-
Analyzing security protocols with secrecy types and logic programs
-
M. Abadi and B. Blanchet. Analyzing Security Protocols with Secrecy Types and Logic Programs. Journal of the ACM, 52(1):102-146, 2005.
-
(2005)
Journal of the ACM
, vol.52
, Issue.1
, pp. 102-146
-
-
Abadi, M.1
Blanchet, B.2
-
5
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148:1-70, 1999.
-
(1999)
Information and Computation
, vol.148
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
6
-
-
84958749546
-
From secrecy to authenticity in security protocols
-
9th International Static Analysis Symposium (SAS'02). Springer
-
B. Blanchet. From secrecy to authenticity in security protocols. In 9th International Static Analysis Symposium (SAS'02), volume 2477 of LNCS, pages 242-259. Springer, 2002.
-
(2002)
LNCS
, vol.2477
, pp. 242-259
-
-
Blanchet, B.1
-
7
-
-
28144441375
-
On declassification and the non-disclosure policy
-
IEEE Computer Society Press. To appear
-
G. Boudol and A. Matos. On declassification and the non-disclosure policy. In 18th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, 2005. To appear.
-
(2005)
18th IEEE Computer Security Foundations Workshop
-
-
Boudol, G.1
Matos, A.2
-
9
-
-
12444303307
-
Secrecy and group creation
-
L. Cardelli, G. Ghelli, and A. D. Gordon. Secrecy and group creation. Information and Computation, 196(2): 127-155, 2005.
-
(2005)
Information and Computation
, vol.196
, Issue.2
, pp. 127-155
-
-
Cardelli, L.1
Ghelli, G.2
Gordon, A.D.3
-
11
-
-
35248815623
-
Typing one-to-one and one-to-many correspondences in security protocols
-
Software Security - Theories and Systems. Springer
-
A. D. Gordon and A. Jeffrey. Typing one-to-one and one-to-many correspondences in security protocols. In Software Security - Theories and Systems, volume 2609 of LNCS, pages 270-282. Springer, 2002.
-
(2002)
LNCS
, vol.2609
, pp. 270-282
-
-
Gordon, A.D.1
Jeffrey, A.2
-
12
-
-
0141863341
-
Authenticity by typing for security protocols
-
A. D. Gordon and A. Jeffrey. Authenticity by typing for security protocols. Journal of Computer Security, 11(4):451-521, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.4
, pp. 451-521
-
-
Gordon, A.D.1
Jeffrey, A.2
-
13
-
-
3042660681
-
Types and effects for asymmetric cryptographic protocols
-
A. D. Gordon and A. Jeffrey. Types and effects for asymmetric cryptographic protocols. Journal of Computer Security, 12(3/4):435-484, 2003.
-
(2003)
Journal of Computer Security
, vol.12
, Issue.3-4
, pp. 435-484
-
-
Gordon, A.D.1
Jeffrey, A.2
-
14
-
-
0038414953
-
Typing correspondence assertions for communication protocols
-
A. D. Gordon and A. Jeffrey. Typing correspondence assertions for communication protocols. Theoretical Computer Science, 300:379-409, 2003.
-
(2003)
Theoretical Computer Science
, vol.300
, pp. 379-409
-
-
Gordon, A.D.1
Jeffrey, A.2
-
15
-
-
27244431608
-
Secrecy despite compromise: Types, cryptography, and the pi-calculus
-
Microsoft Research
-
A. D. Gordon and A. Jeffrey. Secrecy despite compromise: Types, cryptography, and the pi-calculus. Technical Report MSR-TR-2005-76, Microsoft Research, 2005.
-
(2005)
Technical Report
, vol.MSR-TR-2005-76
-
-
Gordon, A.D.1
Jeffrey, A.2
-
16
-
-
84979035734
-
A typed process calculus for fine-grained resource access control in distributed computation
-
4th International Symposium on Theoretical Aspects of Computer Software (TACS 2001). Springer
-
D. Hoshina, E. Sumii, and A. Yonezawa. A typed process calculus for fine-grained resource access control in distributed computation. In 4th International Symposium on Theoretical Aspects of Computer Software (TACS 2001), volume 2215 of LNCS, pages 64-81. Springer, 2001.
-
(2001)
LNCS
, vol.2215
, pp. 64-81
-
-
Hoshina, D.1
Sumii, E.2
Yonezawa, A.3
-
19
-
-
84957891289
-
Polarized name passing
-
Foundations of Software Technology and Theoretical Computer Science. Springer
-
M. Odersky. Polarized name passing. In Foundations of Software Technology and Theoretical Computer Science, volume 1026 of LNCS, pages 324-335. Springer, 1995.
-
(1995)
LNCS
, vol.1026
, pp. 324-335
-
-
Odersky, M.1
-
23
-
-
24344486699
-
The Flow Caml system: Documentation and user's manual
-
INRIA
-
V. Simonet. The Flow Caml system: documentation and user's manual. Technical Report 0282, INRIA, 2003.
-
(2003)
Technical Report
, vol.282
-
-
Simonet, V.1
|