Secrecy in security protocols as non interference

Citations of this article
Mendeley users who have this article in their library.


Non Interference has been proposed for modelling and analysing information flow in systems. In [4,7] we have indeed shown that the Non Interference property called NDC can be applied also in the area of network security, for the analysis of typical cryptographic protocol properties (e.g., authentication, non-repudiation). In this paper we extend the results of by showing that NDC can be also easily adapted to detect secrecy attacks over networks. © 2000 Published by Elsevier Science B.V.




Focardi, R., Gorrieri, R., & Martinelli, F. (2000). Secrecy in security protocols as non interference. In Electronic Notes in Theoretical Computer Science (Vol. 32, pp. 101–112).

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free