{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T03:23:12Z","timestamp":1778296992617,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540418641","type":"print"},{"value":"9783540453154","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45315-6_2","type":"book-chapter","created":{"date-parts":[[2007,12,3]],"date-time":"2007-12-03T06:28:39Z","timestamp":1196663319000},"page":"25-41","source":"Crossref","is-referenced-by-count":23,"title":["Secrecy Types for Asymmetric Communication"],"prefix":"10.1007","author":[{"given":"Mart\u00edn","family":"Abadi","sequence":"first","affiliation":[]},{"given":"Bruno","family":"Blanchet","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,3,23]]},"reference":[{"issue":"5","key":"2_CR1","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1145\/324133.324266","volume":"46","author":"M. Abadi","year":"1999","unstructured":"Mart\u00edn Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749\u2013786, September 1999.","journal-title":"Journal of the ACM"},{"key":"2_CR2","unstructured":"Mart\u00edn Abadi. Security protocols and their properties. In F.L. Bauer and R. Steinbrueggen, editors, Foundations of Secure Computation, NATO Science Series, pages 39\u201360. IOS Press, 2000. Volume for the 20th International Summer School on Foundations of Secure Computation, held in Marktoberdorf, Germany (1999)."},{"issue":"1","key":"2_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1006\/inco.1998.2740","volume":"148","author":"M. Abadi","year":"1999","unstructured":"Mart\u00edn Abadi and Andrew D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1\u201370, January 1999. An extended version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998.","journal-title":"Information and Computation"},{"issue":"1","key":"2_CR4","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/32.481513","volume":"22","author":"M. Abadi","year":"1996","unstructured":"Mart\u00edn Abadi and Roger Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6\u201315, January 1996.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Ross Anderson and Roger Needham. Robustness principles for public key protocols. In Proceedings of Crypto\u2019 95, pages 236\u2013247, 1995.","DOI":"10.1007\/3-540-44750-4_19"},{"issue":"25","key":"2_CR6","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1002\/spe.4380251305","volume":"S4","author":"A. Birrell","year":"1995","unstructured":"Andrew Birrell, Greg Nelson, Susan Owicki, and Edward Wobber. Network objects. Software Practice and Experience, S4(25):87\u2013130, December 1995.","journal-title":"Software Practice and Experience"},{"key":"2_CR7","unstructured":"Chiara Bodei. Security Issues in Process Calculi. PhD thesis, Universit\u00e0 di Pisa, January 2000."},{"key":"2_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/BFb0055617","volume-title":"CONCUR\u201998: Concurrency Theory","author":"C. Bodei","year":"1998","unstructured":"Chiara Bodei, Pierpaolo Degano, Flemming Nielson, and Hanne Riis Nielson. Control flow analysis for the\u03c0-calculus. In CONCUR\u201998: Concurrency Theory, volume 1466 of Lecture Notes in Computer Science, pages 84\u201398. Springer Verlag, September 1998."},{"key":"2_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/3-540-44618-4_27","volume-title":"CONCUR 2000: Concurrency Theory","author":"L. Cardelli","year":"2000","unstructured":"Luca Cardelli, Giorgio Ghelli, and Andrew D. Gordon. Secrecy and group creation. In Catuscia Palamidessi, editor, CONCUR 2000: Concurrency Theory, volume 1877 of Lecture Notes in Computer Science, pages 365\u2013379. Springer-Verlag, August 2000."},{"key":"2_CR10","volume-title":"Cryptography and Data Security","author":"D. E. Denning","year":"1982","unstructured":"Dorothy E. Denning. Cryptography and Data Security. Addison-Wesley, Reading, Mass., 1982."},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"C\u00e9dric Fournet and Georges Gonthier. The reflexive chemical abstract machine and the join-calculus. In Proceedings of the 23rd ACM Symposium on Principles of Programming Languages, pages 372\u2013385, January 1996.","DOI":"10.1145\/237721.237805"},{"key":"2_CR12","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"Shafi Goldwasser and Silvio Micali. Probabilistic encryption. Journal of Computer and System Sciences, 28:270\u2013299, April 1984.","journal-title":"Journal of Computer and System Sciences"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Nevin Heintze and Jon G. Riecke. The SLam calculus: programming with secrecy and integrity. In Proceedings of the 25th ACM Symposium on Principles of Programming Languages, pages 365\u2013377, 1998.","DOI":"10.1145\/268946.268976"},{"key":"2_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/3-540-45022-X_35","volume-title":"Proceedings of the 27th International Colloquium on Automata, Languages and Programming","author":"M. Hennessy","year":"2000","unstructured":"Matthew Hennessy and James Riely. Information flow vs. resource access in the asynchronous pi-calculus. In Proceedings of the 27th International Colloquium on Automata, Languages and Programming, Lecture Notes in Computer Science, pages 415\u2013427. Springer-Verlag, 2000."},{"key":"2_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/3-540-46425-5_12","volume-title":"Programming Languages and Systems: Proceedings of the 9th European Symposium on Programming (ESOP 2000)","author":"K. Honda","year":"2000","unstructured":"Kohei Honda, Vasco Vasconcelos, and Nobuko Yoshida. Secure information flow as typed process behaviour. In Gert Smolka, editor, Programming Languages and Systems: Proceedings of the 9th European Symposium on Programming (ESOP 2000), Held as Part of the Joint European Conferences on Theory and Practice of Software (ETAPS 2000), volume 1782 of Lecture Notes in Computer Science, pages 180\u2013199. Springer-Verlag, 2000."},{"key":"2_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/BFb0054294","volume-title":"Mathematics of Program Construction, 4th International Conference","author":"K. Rustan","year":"1998","unstructured":"K. Rustan M. Leino and Rajeev Joshi. A semantic approach to secure information flow. In Mathematics of Program Construction, 4th International Conference, volume 1422 of Lecture Notes in Computer Science, pages 254\u2013271. Springer Verlag, 1998."},{"key":"2_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/3-540-61042-1_43","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"G. Lowe","year":"1996","unstructured":"Gavin Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems, volume 1055 of Lecture Notes in Computer Science, pages 147\u2013166. Springer Verlag, 1996."},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996.","DOI":"10.1201\/9781439821916"},{"key":"2_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"856","DOI":"10.1007\/BFb0055108","volume-title":"Proceedings of the 25th International Colloquium on Automata, Languages and Programming","author":"M. Merro","year":"1998","unstructured":"Massimo Merro and Davide Sangiorgi. On asynchrony in name-passing calculi. In Proceedings of the 25th International Colloquium on Automata, Languages and Programming, volume 1443 of Lecture Notes in Computer Science, pages 856\u2013867. Springer-Verlag, 1998."},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Jon Millen and Harald Ruess. Protocol-independent secrecy. In Proceedings 2000 IEEE Symposium on Security and Privacy, pages 110\u2013119, May 2000.","DOI":"10.1109\/SECPRI.2000.848449"},{"key":"2_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0890-5401(92)90008-4","volume":"100","author":"R. Milner","year":"1992","unstructured":"Robin Milner, Joachim Parrow, and David Walker. A calculus of mobile processes, parts I and II. Information and Computation, 100:1\u201340 and 41-77, September 1992.","journal-title":"Information and Computation"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Andrew C. Myers. JFlow: Practical mostly-static information flow control. In Proceedings of the 26th ACM Symposium on Principles of Programming Languages, pages 228\u2013241, January 1999.","DOI":"10.1145\/292540.292561"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Andrew C. Myers and Barbara Liskov. A decentralized model for information flow control. In Proceedings of the 16th ACM Symposium on Operating System Principles, pages 129\u2013142, 1997.","DOI":"10.1145\/268998.266669"},{"issue":"12","key":"2_CR24","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R. M. Needham","year":"1978","unstructured":"Roger M. Needham and Michael D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993\u2013999, December 1978.","journal-title":"Communications of the ACM"},{"issue":"1-2","key":"2_CR25","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"L. C. Paulson","year":"1998","unstructured":"L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1-2):85\u2013128, 1998.","journal-title":"Journal of Computer Security"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Fran-cois Pottier and Sylvain Conchon. Information flow inference for free. In Proceedings of the 2000 ACM SIGPLAN International Conference on Functional Programming (ICFP\u201900), pages 46\u201357, September 2000.","DOI":"10.1145\/351240.351245"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"James Riely and Matthew Hennessy. Trust and partial typing in open systems of mobile agents. In Proceedings of the 26th ACM Symposium on Principles of Programming Languages, pages 93\u2013104, January 1999.","DOI":"10.1145\/292540.292551"},{"key":"2_CR28","doi-asserted-by":"crossref","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","volume":"4","author":"D. Volpano","year":"1996","unstructured":"Dennis Volpano, Cynthia Irvine, and Geoffrey Smith. A sound type system for secure flow analysis. Journal of Computer Security, 4:167\u2013187, 1996.","journal-title":"Journal of Computer Security"}],"container-title":["Lecture Notes in Computer Science","Foundations of Software Science and Computation Structures"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45315-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T04:57:20Z","timestamp":1737608240000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45315-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540418641","9783540453154"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/3-540-45315-6_2","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]}}}