Back to Results
First PageMeta Content
Logic in computer science / Predicate logic / Function / Π-calculus / Combinatory logic / Free variables and bound variables / FO / Μ operator / Linear temporal logic / Mathematics / Mathematical logic / Theoretical computer science


Event structure semantics for security protocols Jonathan Hayman and Glynn Winskel ? Computer Laboratory, University of Cambridge, United Kingdom
Add to Reading List

Document Date: 2013-10-23 07:37:11


Open Document

File Size: 406,14 KB

Share Result on Facebook

Company

Needham / M Lp / Computer Laboratory / /

Country

United Kingdom / /

Event

FDA Phase / /

Facility

University of Cambridge / /

IndustryTerm

cryptographic protocols / public key protocol / public key authentication protocol / important tool / security protocols / untrustworthy network / /

Organization

University of Cambridge / /

Person

Glynn Winskel Parallel / Jonathan Hayman / Schroeder / Glynn Winskel / /

Position

spy / Prime Minister / .pM / .nil Spy / /

Product

B. Resp / SPL / /

ProgrammingLanguage

Erlang / /

Technology

encryption / cryptography / public key protocol / public key / public key authentication protocol / exchange protocols / security protocols / private key / NSL protocol / 1 Introduction Protocols / using a public key / be encrypted using a public key / /

SocialTag