Author:
Abadi Martí;n,Rogaway Phillip
Publisher
Springer Berlin Heidelberg
Reference37 articles.
1. Lect Notes Comput Sci;M. Abadi,1998
2. Martýn Abadi, Cédric Fournet, and Georges Gonthier. Secure implementation of channel abstractions. In Proceedings of the Thirteenth Annual IEEE Symposium on Logic in Computer Science, pages 105–116, June 1998.
3. Martýn Abadi and Andrew D. Gordon. A calculus for cryptographic protocols: The Spi calculus. In Proceedings of the Fourth ACM Conference on Computer and Communications Security, pages 36–47, 1997.
4. Martýn Abadi and Andrew D. Gordon. A bisimulation method for cryptographic protocols. Nordic Journal of Computing, 5(4):267–303, Winter 1998.
5. Martýn Abadi and Andrew D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1–70, January1999. An extended version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998.
Cited by
77 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Language-Based Security for Low-Level MPC;Proceedings of the 26th International Symposium on Principles and Practice of Declarative Programming;2024-09-09
2. SCB Mode: Semantically Secure Length-Preserving Encryption;IACR Transactions on Symmetric Cryptology;2022-12-07
3. Tidy: Symbolic Verification of Timed Cryptographic Protocols;Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security;2022-11-07
4. Libertas: Backward Private Dynamic Searchable Symmetric Encryption Supporting Wildcards;Lecture Notes in Computer Science;2022
5. RV-TEE-Based Trustworthy Secure Shell Deployment: An Empirical Evaluation.;The Journal of Object Technology;2022