메뉴 건너뛰기




Volumn 168, Issue SPEC. ISS., 2007, Pages 159-174

Epistemic Verification of Anonymity

Author keywords

anonymity; dynamic epistemic modeling; protocol verification

Indexed keywords

AUTOMATA THEORY; BROADCASTING; MATHEMATICAL MODELS; NETWORK PROTOCOLS;

EID: 33846808999     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2006.08.026     Document Type: Article
Times cited : (33)

References (33)
  • 1
    • 0010276940 scopus 로고    scopus 로고
    • A logic for suspicious players: epistemic action and belief-updates in games
    • Baltag A. A logic for suspicious players: epistemic action and belief-updates in games. Bulletin of Economic Research 54 (2002) 1-45
    • (2002) Bulletin of Economic Research , vol.54 , pp. 1-45
    • Baltag, A.1
  • 2
    • 14044275654 scopus 로고    scopus 로고
    • Logics for Epistemic Programs
    • Baltag A., and Moss L.S. Logics for Epistemic Programs. Synthese 139 (2004) 165-224
    • (2004) Synthese , vol.139 , pp. 165-224
    • Baltag, A.1    Moss, L.S.2
  • 3
    • 33846848227 scopus 로고    scopus 로고
    • Baltag, A., L.S. Moss and S. Solecki, The logic of public announcements, common knowledge, and private suspicions, Technical report, Dept. of Cognitive Science, Indiana University and Dept. of Computing, Oxford University (2003)
  • 4
    • 27244455746 scopus 로고    scopus 로고
    • Probabilistic Anonymity
    • Proceedings CONCUR'05
    • Bhargava M., and Palamidessi C. Probabilistic Anonymity. Proceedings CONCUR'05. LNCS 3653 (2005) 171-185
    • (2005) LNCS , vol.3653 , pp. 171-185
    • Bhargava, M.1    Palamidessi, C.2
  • 5
    • 33846830183 scopus 로고    scopus 로고
    • Bleeker, A. and J. van Eijck, Epistemic Action and Change, in: LOFT-4 Proceedings, 2000
  • 8
    • 33846845323 scopus 로고    scopus 로고
    • Reprinted from the Proceedings of the Royal Society, volume 426, number 1871, 1989
  • 9
    • 0023861309 scopus 로고
    • The dining cryptographers problem: unconditional sender and receiver untraceability
    • Chaum D. The dining cryptographers problem: unconditional sender and receiver untraceability. Journal of Cryptology 1 (1988) 65-75
    • (1988) Journal of Cryptology , vol.1 , pp. 65-75
    • Chaum, D.1
  • 11
    • 33846806242 scopus 로고    scopus 로고
    • Chothia, T., S.M. Orzan and J. Pang, Automatically Checking Anonymity Using Distributed mCRL (2006), under submission. Draft available from http://www.win.tue.nl/~sorzan/anonmcrl.pdf
  • 12
    • 84863310087 scopus 로고    scopus 로고
    • CWI, LYS (2005), available from
    • CWI, LYS (2005), available from. http://www.win.tue.nl/~sorzan/lys/
  • 15
    • 77954124943 scopus 로고
    • A Practical Secret Voting Scheme for Large Scale Elections
    • ASIACRYPT
    • Fujioka A., Okamoto T., and Ohta K. A Practical Secret Voting Scheme for Large Scale Elections. ASIACRYPT. LNCS 718 (1992) 244-251
    • (1992) LNCS , vol.718 , pp. 244-251
    • Fujioka, A.1    Okamoto, T.2    Ohta, K.3
  • 16
    • 31844437820 scopus 로고    scopus 로고
    • Garcia, F.D., I. Hasuo, P. van Rossum and W. Pieters, Provable Anonymity, in: Proceedings of the ACM Workshop on Formal Methods in Security Engineering (FMSE'05) (2005), pp. 63-72
  • 17
    • 24144492346 scopus 로고    scopus 로고
    • Anonymity and Information Hiding in Multiagent Systems
    • Halpern J.Y., and O'Neill K.R. Anonymity and Information Hiding in Multiagent Systems. Journal of Computer Security (2005) 483-514
    • (2005) Journal of Computer Security , pp. 483-514
    • Halpern, J.Y.1    O'Neill, K.R.2
  • 21
    • 33751178365 scopus 로고    scopus 로고
    • Update Semantics of Security Protocols
    • Hommersom A., Meyer J.-J., and de Vink E.P. Update Semantics of Security Protocols. Synthese 142 (2004) 229-267
    • (2004) Synthese , vol.142 , pp. 229-267
    • Hommersom, A.1    Meyer, J.-J.2    de Vink, E.P.3
  • 22
    • 0344875575 scopus 로고    scopus 로고
    • Information Hiding, Anonymity and Privacy: A Modular Approach
    • Hughes D., and Shmatikov V. Information Hiding, Anonymity and Privacy: A Modular Approach. Journal of Computer Security 12 (2004) 3-36
    • (2004) Journal of Computer Security , vol.12 , pp. 3-36
    • Hughes, D.1    Shmatikov, V.2
  • 23
    • 23144432349 scopus 로고    scopus 로고
    • Analysis of an Electronic Voting Protocol in the Applied Pi-Calculus
    • Programming Languages and Systems - Proceedings of the 14th European Symposium on Programming. (ESOP'05)
    • Kremer S., and Ryan M.D. Analysis of an Electronic Voting Protocol in the Applied Pi-Calculus. Programming Languages and Systems - Proceedings of the 14th European Symposium on Programming. (ESOP'05). LNCS 3444 (2005) 186-200
    • (2005) LNCS , vol.3444 , pp. 186-200
    • Kremer, S.1    Ryan, M.D.2
  • 24
    • 33846815660 scopus 로고    scopus 로고
    • Nirmal, S., "Verification of Security Protocols: tool support for Update Semantics," Master's thesis, Technical University Eindhoven (2005)
  • 25
    • 22444450832 scopus 로고
    • Application of modal logic to programming
    • Pratt V. Application of modal logic to programming. Studia Logica 39 (1980) 257-274
    • (1980) Studia Logica , vol.39 , pp. 257-274
    • Pratt, V.1
  • 26
    • 18744403444 scopus 로고    scopus 로고
    • A Tool for Specification and Verification of Epistemic Properties in Interpreted Systems
    • Raimondi F., and Lomuscio A. A Tool for Specification and Verification of Epistemic Properties in Interpreted Systems. Electronic Notes in Theoretical Computer Science 85 (2004)
    • (2004) Electronic Notes in Theoretical Computer Science , vol.85
    • Raimondi, F.1    Lomuscio, A.2
  • 27
    • 84949756689 scopus 로고    scopus 로고
    • CSP and Anonymity
    • Proc. ESORICS'96. Bertino E., Kurth H., Martella G., and Montolivo E. (Eds)
    • Schneider S., and Sidiropoulos A. CSP and Anonymity. In: Bertino E., Kurth H., Martella G., and Montolivo E. (Eds). Proc. ESORICS'96. LNCS 1146 (1996) 198-218
    • (1996) LNCS , vol.1146 , pp. 198-218
    • Schneider, S.1    Sidiropoulos, A.2
  • 28
    • 84856010522 scopus 로고    scopus 로고
    • van Benthem, J., J. van Eijck and B. Kooi, Logics of Communication and Change, Information and Computation (2006), to appear
  • 29
    • 0346338341 scopus 로고    scopus 로고
    • Common Knowledge and update in finite environments
    • van der Meyden R. Common Knowledge and update in finite environments. Information and Computation 140 (1998) 115-157
    • (1998) Information and Computation , vol.140 , pp. 115-157
    • van der Meyden, R.1
  • 30
    • 4944250729 scopus 로고    scopus 로고
    • van der Meyden, R. and K. Su, Symbolic Model Checking the Knowledge of the Dining Cryptographers, in: Proc. CSFW'04, Pacific Grove (2004), pp. 280-291
  • 31
    • 31644448537 scopus 로고    scopus 로고
    • Model Checking Russian Cards
    • Proc. MoChArt'05. Pecheur C., and Williams B. (Eds)
    • van Ditmarsch H., van der Hoek W., van der Meyden R., and Ruan J. Model Checking Russian Cards. In: Pecheur C., and Williams B. (Eds). Proc. MoChArt'05. ENTCS 149 2 (2006) 105-123
    • (2006) ENTCS , vol.149 , Issue.2 , pp. 105-123
    • van Ditmarsch, H.1    van der Hoek, W.2    van der Meyden, R.3    Ruan, J.4
  • 33
    • 33846830182 scopus 로고    scopus 로고
    • van Eijck, J. and S.M. Orzan, Modelling the Epistemics of Communication with Functional Programming, in: M. van Eekelen, editor, Sixth Symposium on Trends in Functional Programming TFP'05, Institute of Cybernetics, Tallinn Technical University, Tallinn, 2005, pp. 44-59


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.