A top-down look at a secure message

4Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In ongoing work, we are investigating the design of secure distributed implementations of high-level process calculi (in particular, of the join-calculus). We formulate implementations as translations to lower-level languages with cryptographic primitives. Cryptographic protocols are essential components of those translations. In this paper we discuss basic cryptographic protocols for transmitting a single datum from one site to another. We explain some sufficient correctness conditions for these protocols. As an example, we present a simple protocol and a proof of its correctness. © Springer-Verlag Berlin Heidelberg 1999.

Cite

CITATION STYLE

APA

Abadi, M., Fournet, C., & Gonthier, G. (1999). A top-down look at a secure message. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1738, pp. 122–141). Springer Verlag. https://doi.org/10.1007/3-540-46691-6_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free