Analyzing security protocols with secrecy types and logic programs

59Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We study and further develop two language-based techniques for analyzing security protocols. One is based on a typed process calculus; the other, on untyped logic programs. Both focus on secrecy properties. We contribute to these two techniques, in particular by extending the former with a flexible, generic treatment of many cryptographic operations. We also establish an equivalence between the two techniques.

Cite

CITATION STYLE

APA

Abadi, M., & Blanchet, B. (2002). Analyzing security protocols with secrecy types and logic programs. In Conference Record of the Annual ACM Symposium on Principles of Programming Languages (pp. 33–44). Association for Computing Machinery (ACM). https://doi.org/10.1145/503272.503277

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free