Sciweavers

17 search results - page 2 / 4
» Computational Secrecy by Typing for the Pi Calculus
Sort
View
CONCUR
2008
Springer
13 years 7 months ago
Spatial and Behavioral Types in the Pi-Calculus
We present a framework that combines ideas from spatial logics and Igarashi and Kobayashi's behavioural type systems, drawing benefits from both. In our approach, type systems...
Lucia Acciai, Michele Boreale
CONCUR
2005
Springer
13 years 10 months ago
Timed Spi-Calculus with Types for Secrecy and Authenticity
Abstract. We present a discretely timed spi-calculus. A primitive for key compromise allows us to model key compromise attacks, thus going beyond the standard Dolev–Yao attacker ...
Christian Haack, Alan Jeffrey
BIRTHDAY
2000
Springer
13 years 9 months ago
Pict: a programming language based on the Pi-Calculus
The -calculus o ers an attractive basis for concurrent programming. It is small, elegant, and well studied, and supports via simple encodings a wide range of high-level constru...
Benjamin C. Pierce, David N. Turner
ICALP
2003
Springer
13 years 10 months ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...
FOSSACS
2005
Springer
13 years 10 months ago
Full Abstraction for Polymorphic Pi-Calculus
traction for Polymorphic Pi-Calculus Alan Jeffrey 1,2 and Julian Rathke3 1 Bell Labs, Lucent Technologies, Chicago, IL, USA 2 DePaul University, Chicago, IL, USA 3 University of Su...
Alan Jeffrey, Julian Rathke