Chapter 25: Secure APTC
Abstract
This chapter introduces the modeling of security based on truly concurrent process algebra.
Keywords
Security; Process Algebra; True Concurrency
Cryptography mainly includes two aspects: the cryptographic operations and security protocols. The former includes symmetric and asymmetric encryption/decryption, hash, digital signatures, message authentication codes, random sequence generation, and XOR, etc. The latter includes the computational logic driven by the security application logics among the cryptographic operations.
In this chapter, we model the above two cryptographic properties by APTC (). In Section 25.1 ...
Get Handbook of Truly Concurrent Process Algebra now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.