In this paper, we introduce the crypto-loc calculus, a calculus for modelling secure mobile computations that combine the concepts of locations, cryptography, and code mobility. All these concepts exist in mobile systems, for example, Java applets run within sandboxes or downloaded under an SSL connection. We use observational equivalence of processes as a powerful means of defining security properties, and characterize observational equivalence in terms of a labelled bisimilarity relation, which makes its proof much easier
The Seal calculus is a distributed process calculus in which locations and movement of computational...
Abstract. We propose a process calculus for mobile ad hoc networks which relies on an abstract behav...
A programming notation is introduced that can be used for protecting secrecy and integrity of data i...
In this paper, we introduce the crypto-loc calculus, a calculus for modelling secure mobile computat...
Abstract. Ambient calculi are a promising formalism for specifying mo-bile computation, which benefi...
AbstractThis paper sketches an idea on how to challenge the three security issues concentrating on c...
The SEAL calculus is a calculus of mobile computations designed for programming secure distributed a...
We present a Mobile-Ambients-based process calculus to describe context-aware computing in an infras...
We propose a process calculus for mobile ad hoc networks which embodies a behaviour-based multilevel...
A programming notation is introduced that can be used for protecting secrecy and integrity of data i...
This paper scratches the surface of the problem of classifying the attacks that a mobile computation...
Ubiquitous computing makes various computing devices available throughout the physical setting. Ubiq...
This thesis proposes a typing discipline to control the migration of code in a distributed, mobile e...
Mobile code computation has lead to a new paradigm of distributed computation. A mobile process can ...
AbstractA programming notation is introduced that can be used for protecting secrecy and integrity o...
The Seal calculus is a distributed process calculus in which locations and movement of computational...
Abstract. We propose a process calculus for mobile ad hoc networks which relies on an abstract behav...
A programming notation is introduced that can be used for protecting secrecy and integrity of data i...
In this paper, we introduce the crypto-loc calculus, a calculus for modelling secure mobile computat...
Abstract. Ambient calculi are a promising formalism for specifying mo-bile computation, which benefi...
AbstractThis paper sketches an idea on how to challenge the three security issues concentrating on c...
The SEAL calculus is a calculus of mobile computations designed for programming secure distributed a...
We present a Mobile-Ambients-based process calculus to describe context-aware computing in an infras...
We propose a process calculus for mobile ad hoc networks which embodies a behaviour-based multilevel...
A programming notation is introduced that can be used for protecting secrecy and integrity of data i...
This paper scratches the surface of the problem of classifying the attacks that a mobile computation...
Ubiquitous computing makes various computing devices available throughout the physical setting. Ubiq...
This thesis proposes a typing discipline to control the migration of code in a distributed, mobile e...
Mobile code computation has lead to a new paradigm of distributed computation. A mobile process can ...
AbstractA programming notation is introduced that can be used for protecting secrecy and integrity o...
The Seal calculus is a distributed process calculus in which locations and movement of computational...
Abstract. We propose a process calculus for mobile ad hoc networks which relies on an abstract behav...
A programming notation is introduced that can be used for protecting secrecy and integrity of data i...