Secure sessions for Web services
ACM Transactions on Information and System Security (TISSEC)
Secure compilation of a multi-tier web language
Proceedings of the 4th international workshop on Types in language design and implementation
Security in Distributed Applications
Advances in Software Engineering
Typing one-to-one and one-to-many correspondences in security protocols
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Specifying authentication using signal events in CSP
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Protocol analysis for concrete environments
EUROCAST'05 Proceedings of the 10th international conference on Computer Aided Systems Theory
Veracity, plausibility, and reputation
WISTP'12 Proceedings of the 6th IFIP WG 11.2 international conference on Information Security Theory and Practice: security, privacy and trust in computing systems and ambient intelligent ecosystems
Hi-index | 0.07 |
Correspondence properties capture authentication only indirectly. We trace the origin of correspondence in the analysis of authentication protocols and investigate to what extent correspondence actually corresponds to the various flavors of authentication.