Secrecy in security protocols as non interference

  • Focardi R
  • Gorrieri R
  • Martinelli F
  • 4


    Mendeley users who have this article in their library.
  • 11


    Citations of this article.


Non Interference has been proposed for modelling and analysing information flow in systems. In [4,7] we have indeed shown that the Non Interference property called NDC can be applied also in the area of network security, for the analysis of typical cryptographic protocol properties (e.g., authentication, non-repudiation). In this paper we extend the results of by showing that NDC can be also easily adapted to detect secrecy attacks over networks. © 2000 Published by Elsevier Science B.V.

Get free article suggestions today

Mendeley saves you time finding and organizing research

Sign up here
Already have an account ?Sign in

Find this document


Cite this document

Choose a citation style from the tabs below

Save time finding and organizing research with Mendeley

Sign up for free