메뉴 건너뛰기




Volumn , Issue , 2007, Pages 251-262

Secure implementations of typed channel abstractions

Author keywords

Full abstraction; Language encodings; Typed behavioral theories

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); CRYPTOGRAPHY; EQUIVALENCE CLASSES;

EID: 34548278382     PISSN: 07308566     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1190216.1190253     Document Type: Conference Paper
Times cited : (6)

References (19)
  • 2
    • 0037052276 scopus 로고    scopus 로고
    • Secure implementation of channel abstractions
    • April
    • M. Abadi, C. Fournet, and G. Gonthier. Secure implementation of channel abstractions. Information and Computation, 174(1):37-83, April 2002.
    • (2002) Information and Computation , vol.174 , Issue.1 , pp. 37-83
    • Abadi, M.1    Fournet, C.2    Gonthier, G.3
  • 3
    • 84878558984 scopus 로고    scopus 로고
    • Protection in programming-language translations
    • Martin Abadi. Protection in programming-language translations. In Proc. of ICALP '98, pages 868-883, 1998.
    • (1998) Proc. of ICALP '98 , pp. 868-883
    • Abadi, M.1
  • 4
    • 23144463868 scopus 로고    scopus 로고
    • Analyzing security protocols with secrecy types and logic programs
    • Martín Abadi and Bruno Blanchet. Analyzing security protocols with secrecy types and logic programs. J. ACM, 52(1):. 102-146, 2005.
    • (2005) J. ACM , vol.52 , Issue.1 , pp. 102-146
    • Abadi, M.1    Blanchet, B.2
  • 5
    • 26444451063 scopus 로고    scopus 로고
    • A fully abstract encoding of the π-calculus with data terms
    • Michael Baldamus, Joachim Parrow, and Björn Victor. A fully abstract encoding of the π-calculus with data terms. In Proc. of ICALP '05, pages 1202-1213, 2005.
    • (2005) Proc. of ICALP '05 , pp. 1202-1213
    • Baldamus, M.1    Parrow, J.2    Victor, B.3
  • 6
    • 84958749546 scopus 로고    scopus 로고
    • From Secrecy to Authenticity in Security Protocols
    • Manuel Hermenegildo and Germán Puebla, editors, 9th International Static Analysis Symposium SAS'02, of, Madrid, Spain, September, Springer Verlag
    • Bruno Blanchet. From Secrecy to Authenticity in Security Protocols. In Manuel Hermenegildo and Germán Puebla, editors, 9th International Static Analysis Symposium (SAS'02), volume 2477 of Lecture Notes on Computer Science, pages 342-359, Madrid, Spain, September 2002. Springer Verlag.
    • (2002) Lecture Notes on Computer Science , vol.2477 , pp. 342-359
    • Blanchet, B.1
  • 7
    • 3543058869 scopus 로고    scopus 로고
    • Automatic Proof of Strong Secrecy for Security Protocols
    • Oakland, California, May
    • Bruno Blanchet. Automatic Proof of Strong Secrecy for Security Protocols. In IEEE Symposium on Security and Privacy, pages 86-100, Oakland, California, May 2004.
    • (2004) IEEE Symposium on Security and Privacy , pp. 86-100
    • Blanchet, B.1
  • 9
    • 0000203887 scopus 로고    scopus 로고
    • On the expressiveness of internal mobility in namepassing calculi
    • Michele Boreale. On the expressiveness of internal mobility in namepassing calculi. Theor: Comput. Sci., 195(2):205-226, 1998.
    • (1998) Theor: Comput. Sci , vol.195 , Issue.2 , pp. 205-226
    • Boreale, M.1
  • 10
    • 33646204295 scopus 로고    scopus 로고
    • Typed processes in untyped contexts
    • Rocco Nicola and Davide Sangiorgi, editors, Proc. of TGC 2005, Symposium on Trustworthy Global Computing, of, Springer-Verlag
    • M. Bugliesi and M. Giunti. Typed processes in untyped contexts. In Rocco Nicola and Davide Sangiorgi, editors, Proc. of TGC 2005, Symposium on Trustworthy Global Computing, volume 3705 of Lecture Notes on Computer Science, pages 19-32. Springer-Verlag, 2005.
    • (2005) Lecture Notes on Computer Science , vol.3705 , pp. 19-32
    • Bugliesi, M.1    Giunti, M.2
  • 11
    • 0035817803 scopus 로고    scopus 로고
    • Bisimulations in the joincalculus
    • Cédric Fournet and Cosimo Laneve. Bisimulations in the joincalculus. Theor: Comput. Sci., 266(1-2):569-603, 2001.
    • (2001) Theor: Comput. Sci , vol.266 , Issue.1-2 , pp. 569-603
    • Fournet, C.1    Laneve, C.2
  • 13
    • 34548208150 scopus 로고    scopus 로고
    • Marco Giunti. Secure Implementation of Typed Channel Abstractions. PhD thesis, Università di Venezia, 2007. Forthcoming.
    • Marco Giunti. Secure Implementation of Typed Channel Abstractions. PhD thesis, Università di Venezia, 2007. Forthcoming.
  • 14
    • 84994272137 scopus 로고    scopus 로고
    • Typed behavioral equivalences for processes in the presence of subtyping
    • M. Hennessy and J. Rathke. Typed behavioral equivalences for processes in the presence of subtyping. Mathematical Structures in Computer Science, 14(5):651-684, 2003.
    • (2003) Mathematical Structures in Computer Science , vol.14 , Issue.5 , pp. 651-684
    • Hennessy, M.1    Rathke, J.2
  • 15
    • 0029404929 scopus 로고
    • On reduction-based process semantics
    • Kohei Honda and Nobuko Yoshida. On reduction-based process semantics. Theor: Comput. Sci., 151(2):437-486, 1995.
    • (1995) Theor: Comput. Sci , vol.151 , Issue.2 , pp. 437-486
    • Honda, K.1    Yoshida, N.2
  • 16
    • 0034716048 scopus 로고    scopus 로고
    • Decoding choice encodings
    • Uwe Nestmann and Benjamin C. Pierce. Decoding choice encodings. Inf. Comput., 163(1):1-59, 2000.
    • (2000) Inf. Comput , vol.163 , Issue.1 , pp. 1-59
    • Nestmann, U.1    Pierce, B.C.2
  • 18
    • 0000233772 scopus 로고    scopus 로고
    • Behavioral equivalence in the polymorphic pi-calculus
    • Benjamin C. Pierce and Davide Sangiorgi. Behavioral equivalence in the polymorphic pi-calculus. J. ACM, 47(3):531-584, 2000.
    • (2000) J. ACM , vol.47 , Issue.3 , pp. 531-584
    • Pierce, B.C.1    Sangiorgi, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.