A calculus for cryptographic protocols
Information and Computation
Using encryption for authentication in large networks of computers
Communications of the ACM
Process algebra and non-interference
Journal of Computer Security
Non-Interference Through Determinism
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
A General Theory of Composition for Trace Sets Closed under Selective Interleaving Functions
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
The modelling and analysis of security protocols: the csp approach
The modelling and analysis of security protocols: the csp approach
Hi-index | 0.01 |
Over the past decade, techniques from concurrency theory have been applied to problem areas in security, sometimes with extremely successful results. This talk discusses the contribution made by concurrency theory to the analysis of security protocols, and to the eharaeterisation of non-interference properties.