ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1609.03003
  4. Cited By
The Applied Pi Calculus: Mobile Values, New Names, and Secure
  Communication
v1v2 (latest)

The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication

10 September 2016
M. Abadi
B. Blanchet
Cédric Fournet
ArXiv (abs)PDFHTML

Papers citing "The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication"

14 / 14 papers shown
Provably Unlinkable Smart Card-based Payments
Provably Unlinkable Smart Card-based PaymentsConference on Computer and Communications Security (CCS), 2023
Sergiu Bursuc
Ross Horne
S. Mauw
S. Yurkov
186
3
0
06 Sep 2023
Security Analysis of the Consumer Remote SIM Provisioning Protocol
Security Analysis of the Consumer Remote SIM Provisioning ProtocolACM Transactions on Privacy and Security (TOPS), 2022
Abu Shohel Ahmed
Aleksi Peltonen
Mohit Sethi
T. Aura
111
10
0
28 Nov 2022
Automating Cryptographic Protocol Language Generation from Structured
  Specifications
Automating Cryptographic Protocol Language Generation from Structured SpecificationsFME Workshop on Formal Methods in Software Engineering (FFMSE), 2021
Roberto Metere
Luca Arnaboldi
129
9
0
19 May 2021
Processes, Systems and Tests: Defining Contextual Equivalences
Processes, Systems and Tests: Defining Contextual EquivalencesElectronic Proceedings in Theoretical Computer Science (EPTCS), 2020
Clément Aubert
Daniele Varacca
397
4
0
16 Jul 2020
Decidable Inductive Invariants for Verification of Cryptographic
  Protocols with Unbounded Sessions
Decidable Inductive Invariants for Verification of Cryptographic Protocols with Unbounded SessionsInternational Conference on Concurrency Theory (CONCUR), 2019
Emanuele D’Osualdo
Felix Stutz
206
5
0
13 Nov 2019
Trace Equivalence and Epistemic Logic to Express Security Properties
Trace Equivalence and Epistemic Logic to Express Security Properties
Kiraku Minami
111
4
0
09 Mar 2019
The 5G-AKA Authentication Protocol Privacy
The 5G-AKA Authentication Protocol PrivacyEuropean Symposium on Security and Privacy (EuroS&P), 2018
Adrien Koutsos
158
114
0
16 Nov 2018
Persistent Stochastic Non-Interference
Persistent Stochastic Non-Interference
J. Hillston
Carla Piazza
S. Rossi
105
9
0
27 Aug 2018
Formal Analysis of an E-Health Protocol
Formal Analysis of an E-Health Protocol
Naipeng Dong
H. Jonker
Jun Pang
120
2
0
25 Aug 2018
Journey Beyond Full Abstraction: Exploring Robust Property Preservation
  for Secure Compilation
Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation
Carmine Abate
Roberto Blanco
Deepak Garg
Cătălin Hriţcu
Marco Patrignani
Jérémy Thibault
562
74
0
12 Jul 2018
WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring
WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring
Stefano Calzavara
R. Focardi
Matteo Maffei
Clara Schneidewind
M. Squarcina
M. Tempesta
270
29
0
24 Jun 2018
Analysing and Patching SPEKE in ISO/IEC
Analysing and Patching SPEKE in ISO/IEC
Feng Hao
Roberto Metere
S. F. Shahandashti
Changyu Dong
200
14
0
14 Feb 2018
A new method of verification of security protocols
A new method of verification of security protocols
A. Mironov
36
0
0
01 Jun 2017
Automated verification of dynamic root of trust protocols (long version)
Automated verification of dynamic root of trust protocols (long version)
Sergiu Bursuc
Christian Johansen
Shiwei Xu
185
4
0
30 Jan 2017
1
Page 1 of 1