ThesaHelp: ACM references a-e
ThesaHelp: references a-b
Group: security
Group: type checking
Topic: security leaks and weaknesses
Topic: authentication
| |
Reference
Abadi, M.,
"Secrecy by typing in security protocols",
Journal of the ACM, 46, 5, September 1999, pp. 749-786.
Google
Quotations
750 ;;Quote: use spi calculus for typechecking security protocols using shared-key cryptography
| 750+;;Quote: a security leak occurs if secret data is sent on a public channel instead of a secret channel
| 783 ;;Quote: authenticity concerns data sources and timeliness while secrecy concerns data destinations
|
Related Topics
ThesaHelp: ACM references a-e (259 items)
ThesaHelp: references a-b (396 items)
Group: security (23 topics, 874 quotes)
Group: type checking (12 topics, 392 quotes)
Topic: security leaks and weaknesses (67 items)
Topic: authentication (93 items)
|