메뉴 건너뛰기




Volumn 4279 LNCS, Issue , 2006, Pages 253-269

Computational secrecy by typing for the Pi calculus

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; DISTRIBUTED COMPUTER SYSTEMS; POLYNOMIALS; PROBABILISTIC LOGICS; PROGRAM COMPILERS; THEOREM PROVING;

EID: 33845921212     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11924661_16     Document Type: Conference Paper
Times cited : (13)

References (19)
  • 1
    • 84878558984 scopus 로고    scopus 로고
    • Protection in programming-language translations
    • 25th International Colloquium on Automata, Languages and Programming, of, Springer-Verlag
    • M. Abadi. Protection in programming-language translations. In 25th International Colloquium on Automata, Languages and Programming, volume 1443 of LNCS, pages 868-883. Springer-Verlag, 1998.
    • (1998) LNCS , vol.1443 , pp. 868-883
    • Abadi, M.1
  • 2
    • 0002652530 scopus 로고    scopus 로고
    • Security protocols and their properties
    • F. Bauer and R. Steinbrueggen, editors, Foundations of Secure Computation, IOS Press
    • M. Abadi. Security protocols and their properties. In F. Bauer and R. Steinbrueggen, editors, Foundations of Secure Computation, NATO Science Series, pages 39-60. IOS Press, 2000.
    • (2000) NATO Science Series , pp. 39-60
    • Abadi, M.1
  • 3
    • 0037432692 scopus 로고    scopus 로고
    • Secrecy types for asymmetric communication
    • Apr
    • M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. Theoretical Computer Science, 298(3):387-415, Apr. 2003.
    • (2003) Theoretical Computer Science , vol.298 , Issue.3 , pp. 387-415
    • Abadi, M.1    Blanchet, B.2
  • 5
    • 0037052276 scopus 로고    scopus 로고
    • Secure implementation of channel abstractions
    • Apr
    • M. Abadi, C. Fournet, and G. Gonthier. Secure implementation of channel abstractions. Information and Computation, 174(1):37-83, Apr. 2002.
    • (2002) Information and Computation , vol.174 , Issue.1 , pp. 37-83
    • Abadi, M.1    Fournet, C.2    Gonthier, G.3
  • 6
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1-70, 1999.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 7
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 8
    • 33746364838 scopus 로고    scopus 로고
    • Cryptographically sound implementations for communicating processes (extended abstract)
    • 33rd International Colloquium on Automata, Languages and Programming, of, Springer-Verlag, July
    • P. Adão and C. Fournet. Cryptographically sound implementations for communicating processes (extended abstract). In 33rd International Colloquium on Automata, Languages and Programming, volume 4052 of LNCS, pages 83-94. Springer-Verlag, July 2006.
    • (2006) LNCS , vol.4052 , pp. 83-94
    • Adão, P.1    Fournet, C.2
  • 9
    • 4944234643 scopus 로고    scopus 로고
    • Symmetric encryption in a simulatable Dolev-Yao style cryptographic library
    • M. Backes and B. Pfitzmann. Symmetric encryption in a simulatable Dolev-Yao style cryptographic library. In 17th IEEE Computer Security Foundations Workshop, pages 204-218, 2004.
    • (2004) 17th IEEE Computer Security Foundations Workshop , pp. 204-218
    • Backes, M.1    Pfitzmann, B.2
  • 13
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Encrocrypt 2001, of, Springer-Verlag
    • R. Canetti and H. Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In Encrocrypt 2001, volume 2045 of LNCS. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2045
    • Canetti, R.1    Krawczyk, H.2
  • 15
    • 24644447402 scopus 로고    scopus 로고
    • A type discipline for authorization policies
    • 14th European Symposium on Programming, of, Springer
    • C. Fournet, A. D. Gordon, and S. Maffeis. A type discipline for authorization policies. In 14th European Symposium on Programming, volume 3444 of LNCS, pages 141-156. Springer, 2005.
    • (2005) LNCS , vol.3444 , pp. 141-156
    • Fournet, C.1    Gordon, A.D.2    Maffeis, S.3
  • 16
    • 3042660681 scopus 로고    scopus 로고
    • Types and effects for asymmetric cryptographic protocols
    • A. D. Gordon and A. S. A. Jeffrey. Types and effects for asymmetric cryptographic protocols. J. Computer Security, 12(3/4):435-484, 2004.
    • (2004) J. Computer Security , vol.12 , Issue.3-4 , pp. 435-484
    • Gordon, A.D.1    Jeffrey, A.S.A.2
  • 17
    • 33745787443 scopus 로고    scopus 로고
    • P. Laud. Secrecy types for a simulatable cryptographic library. In 12th ACM Conference on Computer and Communications Security, pages 26-35, 2005. Also Research Report IT-LU-O-162-050823, Cybernetica, Aug. 2005.
    • P. Laud. Secrecy types for a simulatable cryptographic library. In 12th ACM Conference on Computer and Communications Security, pages 26-35, 2005. Also Research Report IT-LU-O-162-050823, Cybernetica, Aug. 2005.
  • 18
    • 85026563474 scopus 로고    scopus 로고
    • On asynchrony in name-passing calculi
    • 25th International Colloquium on Automata, Languages and Programming, of, Springer-Verlag
    • M. Merro and D. Sangiorgi. On asynchrony in name-passing calculi. In 25th International Colloquium on Automata, Languages and Programming, volume 1443 of LNCS, pages 856-867. Springer-Verlag, 1998.
    • (1998) LNCS , vol.1443 , pp. 856-867
    • Merro, M.1    Sangiorgi, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.