-
2
-
-
0037052276
-
Secure implementation of channel abstractions
-
April
-
M. Abadi, C. Fournet, and G. Gonthier. Secure implementation of channel abstractions. Information and Computation, 174(1):37-83, April 2002.
-
(2002)
Information and Computation
, vol.174
, Issue.1
, pp. 37-83
-
-
Abadi, M.1
Fournet, C.2
Gonthier, G.3
-
3
-
-
84878558984
-
Protection in programming-language translations
-
Martin Abadi. Protection in programming-language translations. In Proc. of ICALP '98, pages 868-883, 1998.
-
(1998)
Proc. of ICALP '98
, pp. 868-883
-
-
Abadi, M.1
-
4
-
-
23144463868
-
Analyzing security protocols with secrecy types and logic programs
-
Martín Abadi and Bruno Blanchet. Analyzing security protocols with secrecy types and logic programs. J. ACM, 52(1):. 102-146, 2005.
-
(2005)
J. ACM
, vol.52
, Issue.1
, pp. 102-146
-
-
Abadi, M.1
Blanchet, B.2
-
5
-
-
26444451063
-
A fully abstract encoding of the π-calculus with data terms
-
Michael Baldamus, Joachim Parrow, and Björn Victor. A fully abstract encoding of the π-calculus with data terms. In Proc. of ICALP '05, pages 1202-1213, 2005.
-
(2005)
Proc. of ICALP '05
, pp. 1202-1213
-
-
Baldamus, M.1
Parrow, J.2
Victor, B.3
-
6
-
-
84958749546
-
From Secrecy to Authenticity in Security Protocols
-
Manuel Hermenegildo and Germán Puebla, editors, 9th International Static Analysis Symposium SAS'02, of, Madrid, Spain, September, Springer Verlag
-
Bruno Blanchet. From Secrecy to Authenticity in Security Protocols. In Manuel Hermenegildo and Germán Puebla, editors, 9th International Static Analysis Symposium (SAS'02), volume 2477 of Lecture Notes on Computer Science, pages 342-359, Madrid, Spain, September 2002. Springer Verlag.
-
(2002)
Lecture Notes on Computer Science
, vol.2477
, pp. 342-359
-
-
Blanchet, B.1
-
7
-
-
3543058869
-
Automatic Proof of Strong Secrecy for Security Protocols
-
Oakland, California, May
-
Bruno Blanchet. Automatic Proof of Strong Secrecy for Security Protocols. In IEEE Symposium on Security and Privacy, pages 86-100, Oakland, California, May 2004.
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 86-100
-
-
Blanchet, B.1
-
8
-
-
0036308321
-
Proof techniques for cryptographic processes
-
M. Boreale, R. De Nicola, and R. Pugliese. Proof techniques for cryptographic processes. SIAM Journal on Computing, 31(3):947-986, 2001.
-
(2001)
SIAM Journal on Computing
, vol.31
, Issue.3
, pp. 947-986
-
-
Boreale, M.1
De Nicola, R.2
Pugliese, R.3
-
9
-
-
0000203887
-
On the expressiveness of internal mobility in namepassing calculi
-
Michele Boreale. On the expressiveness of internal mobility in namepassing calculi. Theor: Comput. Sci., 195(2):205-226, 1998.
-
(1998)
Theor: Comput. Sci
, vol.195
, Issue.2
, pp. 205-226
-
-
Boreale, M.1
-
10
-
-
33646204295
-
Typed processes in untyped contexts
-
Rocco Nicola and Davide Sangiorgi, editors, Proc. of TGC 2005, Symposium on Trustworthy Global Computing, of, Springer-Verlag
-
M. Bugliesi and M. Giunti. Typed processes in untyped contexts. In Rocco Nicola and Davide Sangiorgi, editors, Proc. of TGC 2005, Symposium on Trustworthy Global Computing, volume 3705 of Lecture Notes on Computer Science, pages 19-32. Springer-Verlag, 2005.
-
(2005)
Lecture Notes on Computer Science
, vol.3705
, pp. 19-32
-
-
Bugliesi, M.1
Giunti, M.2
-
11
-
-
0035817803
-
Bisimulations in the joincalculus
-
Cédric Fournet and Cosimo Laneve. Bisimulations in the joincalculus. Theor: Comput. Sci., 266(1-2):569-603, 2001.
-
(2001)
Theor: Comput. Sci
, vol.266
, Issue.1-2
, pp. 569-603
-
-
Fournet, C.1
Laneve, C.2
-
12
-
-
0004092784
-
-
PhD thesis, Ecole Polytechnique, Palaiseau, November, Also published by INRIA, TU-0556
-
Cédric Fournet. The Join-Calculus: a Calculus for Distributed Mobile Programming. PhD thesis, Ecole Polytechnique, Palaiseau., November 1998. Also published by INRIA, TU-0556.
-
(1998)
The Join-Calculus: A Calculus for Distributed Mobile Programming
-
-
Fournet, C.1
-
13
-
-
34548208150
-
-
Marco Giunti. Secure Implementation of Typed Channel Abstractions. PhD thesis, Università di Venezia, 2007. Forthcoming.
-
Marco Giunti. Secure Implementation of Typed Channel Abstractions. PhD thesis, Università di Venezia, 2007. Forthcoming.
-
-
-
-
14
-
-
84994272137
-
Typed behavioral equivalences for processes in the presence of subtyping
-
M. Hennessy and J. Rathke. Typed behavioral equivalences for processes in the presence of subtyping. Mathematical Structures in Computer Science, 14(5):651-684, 2003.
-
(2003)
Mathematical Structures in Computer Science
, vol.14
, Issue.5
, pp. 651-684
-
-
Hennessy, M.1
Rathke, J.2
-
15
-
-
0029404929
-
On reduction-based process semantics
-
Kohei Honda and Nobuko Yoshida. On reduction-based process semantics. Theor: Comput. Sci., 151(2):437-486, 1995.
-
(1995)
Theor: Comput. Sci
, vol.151
, Issue.2
, pp. 437-486
-
-
Honda, K.1
Yoshida, N.2
-
16
-
-
0034716048
-
Decoding choice encodings
-
Uwe Nestmann and Benjamin C. Pierce. Decoding choice encodings. Inf. Comput., 163(1):1-59, 2000.
-
(2000)
Inf. Comput
, vol.163
, Issue.1
, pp. 1-59
-
-
Nestmann, U.1
Pierce, B.C.2
-
18
-
-
0000233772
-
Behavioral equivalence in the polymorphic pi-calculus
-
Benjamin C. Pierce and Davide Sangiorgi. Behavioral equivalence in the polymorphic pi-calculus. J. ACM, 47(3):531-584, 2000.
-
(2000)
J. ACM
, vol.47
, Issue.3
, pp. 531-584
-
-
Pierce, B.C.1
Sangiorgi, D.2
|