Author:
Bodei Chiara,Brodo Linda,Focardi Riccardo
Publisher
Springer International Publishing
Reference18 articles.
1. Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols - the Spi Calculus. Inf. Comput. 148(1), 1–70 (1999)
2. Allamigeon, X., Blanchet, B.: Reconstruction of attacks against cryptographic protocols. In: 18th IEEE Computer Security Foundations Workshop, (CSFW-18 2005), pp. 140–154 (2005)
3. Backes, M., Cortesi, A., Maffei, M.: Causality-based abstraction of multiplicity in security protocols. In: IEEE Computer Security Foundations Symposium (CSF’07), pp. 355–369 (2007)
4. Bodei, C., Brodo, L., Degano, P., Gao, H.: Detecting and preventing type flaws at static time. J. Comput. Secur. 18(2), 229–264 (2010)
5. Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Nielson, H.R.: Static validation of security protocols. Inf. Comput. 13(3), 347–390 (2005)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Modeling and Analyzing Reaction Systems in Maude;Electronics;2024-03-20
2. A process algebraic approach to reaction systems;Theoretical Computer Science;2021-08
3. Dynamic Slicing for Concurrent Constraint Languages;Fundamenta Informaticae;2020-12-10
4. Analysing the Provenance of IoT Data;Communications in Computer and Information Science;2020
5. Tracking Data Trajectories in IoT;Proceedings of the 5th International Conference on Information Systems Security and Privacy;2019