What people are saying - Write a review
We haven't found any reviews in the usual places.
On Unifying Some Cryptographic Protocol Logics
Eliminating Formal Flows in Automated Information Flow Analysis
Simple Timing Channels
10 other sections not shown
Other editions - View all
agent algorithm analysis assume Authentication axiom beliefs BTRM cell CKT5 command complementary suppressions composition Computer Security constraints copying phase correct members covert channels cryptographic protocols database defined delete denote detectors dynamic inference channel encryption example feedback Feedback Arc Set Figure flow tool formal flows formula fromSpace garbage collection hash table initial keystream label lattice linear span logic low-level machine mode change Mode Secure system multilevel security nonce Noninference notation NP-complete object opaque definition operation output function principal problem proof protection levels public key random received reference result satisfies secure interoperation Security and Privacy security classification security levels selective interleaving function semantics sequence solution specification stream cipher strings Table tests Theorem ticket timestamp tion tocol toSpace total order trace set Trojan Horse tuple Turing Test update UTRM valid