메뉴 건너뛰기




Volumn 375, Issue 1-3, 2007, Pages 169-192

A bisimulation for dynamic sealing

Author keywords

calculus; Bisimulation; Contextual equivalence; Cryptographic protocols; Data abstraction; Dynamic sealing; Encryption; Information hiding; Security

Indexed keywords

ABSTRACTING; CRYPTOGRAPHY; SECURITY OF DATA;

EID: 34047126463     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.tcs.2006.12.032     Document Type: Article
Times cited : (49)

References (34)
  • 1
    • 0035035153 scopus 로고    scopus 로고
    • Martín Abadi, Cédric Fournet, Mobile values, new names, and secure communication, in: Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2001, pp. 104-115
  • 2
    • 0000298407 scopus 로고    scopus 로고
    • A bisimulation method for cryptographic protocols
    • Abadi M., and Gordon A.D. A bisimulation method for cryptographic protocols. Nordic Journal of Computing 5 (1998) 267-303
    • (1998) Nordic Journal of Computing , vol.5 , pp. 267-303
    • Abadi, M.1    Gordon, A.D.2
  • 3
    • 84947720399 scopus 로고    scopus 로고
    • A bisimulation method for cryptographic protocols
    • 7th European Symposium on Programming, Springer-Verlag (preliminary version)
    • Abadi M., and Gordon A.D. A bisimulation method for cryptographic protocols. 7th European Symposium on Programming. Lecture Notes in Computer Science vol. 1381 (1998), Springer-Verlag 12-26 (preliminary version)
    • (1998) Lecture Notes in Computer Science , vol.1381 , pp. 12-26
    • Abadi, M.1    Gordon, A.D.2
  • 4
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • Proceedings of the 4th ACM Conference on Computer and Communications Security, 1997, pp. 36-47 (preliminary version)
    • Abadi M., and Gordon A.D. A calculus for cryptographic protocols: The spi calculus. Information and Computation 148 1 (1999) 1-70 Proceedings of the 4th ACM Conference on Computer and Communications Security, 1997, pp. 36-47 (preliminary version)
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 5
    • 0002534194 scopus 로고
    • The lazy lambda calculus
    • Turner D.A. (Ed), Addison-Wesley
    • Abramsky S. The lazy lambda calculus. In: Turner D.A. (Ed). Research Topics in Functional Programming (1990), Addison-Wesley 65-117
    • (1990) Research Topics in Functional Programming , pp. 65-117
    • Abramsky, S.1
  • 6
    • 0036308321 scopus 로고    scopus 로고
    • Proof techniques for cryptographic processes
    • 14th Annual IEEE Symposium on Logic in Computer Science, 1999, pp. 157-166 (preliminary version)
    • Boreale M., De Nicola R., and Pugliese R. Proof techniques for cryptographic processes. SIAM Journal on Computing 31 3 (2002) 947-986 14th Annual IEEE Symposium on Logic in Computer Science, 1999, pp. 157-166 (preliminary version)
    • (2002) SIAM Journal on Computing , vol.31 , Issue.3 , pp. 947-986
    • Boreale, M.1    De Nicola, R.2    Pugliese, R.3
  • 7
    • 84944052768 scopus 로고    scopus 로고
    • On bisimulations for the spi calculus
    • 9th International Conference on Algebraic Methodology and Software Technology, Springer-Verlag
    • Borgström J., and Nestmann U. On bisimulations for the spi calculus. 9th International Conference on Algebraic Methodology and Software Technology. Lecture Notes in Computer Science vol. 2422 (2002), Springer-Verlag 287-303
    • (2002) Lecture Notes in Computer Science , vol.2422 , pp. 287-303
    • Borgström, J.1    Nestmann, U.2
  • 8
    • 0037629421 scopus 로고    scopus 로고
    • Derek Dreyer, Karl Crary, Robert Harper, A type system for higher-order modules, in: Proceedings of the 30th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2003, pp. 236-249
  • 9
    • 0000865197 scopus 로고    scopus 로고
    • Syntactic type abstraction
    • Principals in programming languages: A syntactic proof technique, in: Proceedings of the Fourth ACM SIGPLAN International Conference on Functional Programming (extended abstract), 1999, pp. 197-207
    • Grossman D., Morrisett G., and Zdancewic S. Syntactic type abstraction. ACM Transactions on Programming Languages and Systems 22 6 (2000) 1037-1080 Principals in programming languages: A syntactic proof technique, in: Proceedings of the Fourth ACM SIGPLAN International Conference on Functional Programming (extended abstract), 1999, pp. 197-207
    • (2000) ACM Transactions on Programming Languages and Systems , vol.22 , Issue.6 , pp. 1037-1080
    • Grossman, D.1    Morrisett, G.2    Zdancewic, S.3
  • 10
    • 0000627561 scopus 로고    scopus 로고
    • Proving congruence of bisimulation in functional programming languages
    • Howe D.J. Proving congruence of bisimulation in functional programming languages. Information and Computation 124 2 (1996) 103-112
    • (1996) Information and Computation , vol.124 , Issue.2 , pp. 103-112
    • Howe, D.J.1
  • 11
    • 0032597538 scopus 로고    scopus 로고
    • Alan Jeffrey, Julian Rathke, Towards a theory of bisimulation for local names, in: 14th Annual IEEE Symposium on Logic in Computer Science, 1999, pp. 56-66
  • 12
    • 4243199081 scopus 로고    scopus 로고
    • A theory of bisimulation for a fragment of Concurrent ML with local names
    • 15th Annual IEEE Symposium on Logic in Computer Science (extended abstract), 2000, pp. 311-321
    • Jeffrey A., and Rathke J. A theory of bisimulation for a fragment of Concurrent ML with local names. Theoretical Computer Science 323 (2004) 1-48 15th Annual IEEE Symposium on Logic in Computer Science (extended abstract), 2000, pp. 311-321
    • (2004) Theoretical Computer Science , vol.323 , pp. 1-48
    • Jeffrey, A.1    Rathke, J.2
  • 13
    • 1442288659 scopus 로고    scopus 로고
    • James J. Leifer, Gilles Peskine, Peter Sewell, Keith Wansbrough, Global abstraction-safe marshalling with hash types, in: Proceedings of the Eighth ACM SIGPLAN International Conference on Functional Programming, 2003, pp. 87-98
  • 14
    • 0029205357 scopus 로고    scopus 로고
    • Xavier Leroy, Applicative functors and fully transparent higher-order modules, in: Proceedings of the 22nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1995, pp. 142-153
  • 15
    • 85033219712 scopus 로고    scopus 로고
    • Barbara Liskov, A history of CLU, in: The Second ACM SIGPLAN Conference on History of Programming Languages, 1993, pp. 133-147
  • 16
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public-key authentication protocol
    • Lowe G. An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters 56 3 (1995) 131-133
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 19
    • 0024038082 scopus 로고
    • Abstract types have existential types
    • Proceedings of the 12th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages, 1985, pp. 37-51 (preliminary version)
    • Mitchell J.C., and Plotkin G.D. Abstract types have existential types. ACM Transactions on Programming Languages and Systems 10 3 (1988) 470-502 Proceedings of the 12th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages, 1985, pp. 37-51 (preliminary version)
    • (1988) ACM Transactions on Programming Languages and Systems , vol.10 , Issue.3 , pp. 470-502
    • Mitchell, J.C.1    Plotkin, G.D.2
  • 20
    • 34047155864 scopus 로고    scopus 로고
    • James H. Morris Jr., Lambda-Calculus Models of Programming Languages, Ph.D. Thesis, Massachusetts Institute of Technology, 1968
  • 21
    • 0015561577 scopus 로고
    • Protection in programming languages
    • Morris Jr. J.H. Protection in programming languages. Communications of the ACM 16 1 (1973) 15-21
    • (1973) Communications of the ACM , vol.16 , Issue.1 , pp. 15-21
    • Morris Jr., J.H.1
  • 22
    • 85059176860 scopus 로고    scopus 로고
    • James H. Morris Jr., Types are not sets, in: Proceedings of the 1st Annual ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages, 1973, pp. 120-124
  • 23
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needham R., and Schroeder M. Using encryption for authentication in large networks of computers. Communications of the ACM 21 12 (1978) 993-999
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 24
    • 34047162118 scopus 로고    scopus 로고
    • Benjamin C. Pierce, Eijiro Sumii, Relating cryptography and polymorphism, 2000. Draft. http://www.kb.ecei.tohoku.ac.jp/~sumii/pub/
  • 25
    • 84878538793 scopus 로고    scopus 로고
    • Existential types: Logical relations and operational equivalence
    • Automata, Languages and Programming, Springer-Verlag
    • Pitts A.M. Existential types: Logical relations and operational equivalence. Automata, Languages and Programming. Lecture Notes in Computer Science vol. 1443 (1998), Springer-Verlag 309-326
    • (1998) Lecture Notes in Computer Science , vol.1443 , pp. 309-326
    • Pitts, A.M.1
  • 26
    • 0001233777 scopus 로고    scopus 로고
    • Parametric polymorphism and operational equivalence
    • HOOTS II Second Workshop on Higher-Order Operational Techniques in Semantics, in: Electronic Notes in Theoretical Computer Science, vol. 10, 1998 (preliminary version)
    • Pitts A.M. Parametric polymorphism and operational equivalence. Mathematical Structures in Computer Science 10 (2000) 321-359 HOOTS II Second Workshop on Higher-Order Operational Techniques in Semantics, in: Electronic Notes in Theoretical Computer Science, vol. 10, 1998 (preliminary version)
    • (2000) Mathematical Structures in Computer Science , vol.10 , pp. 321-359
    • Pitts, A.M.1
  • 27
    • 85029606643 scopus 로고
    • Observable properties of higher order functions that dynamically create local names, or: what's new?
    • Mathematical Foundations of Computer Science, Springer-Verlag
    • Pitts A.M., and Stark I. Observable properties of higher order functions that dynamically create local names, or: what's new?. Mathematical Foundations of Computer Science. Lecture Notes in Computer Science vol. 711 (1993), Springer-Verlag 122-141
    • (1993) Lecture Notes in Computer Science , vol.711 , pp. 122-141
    • Pitts, A.M.1    Stark, I.2
  • 28
    • 0020919435 scopus 로고    scopus 로고
    • John C. Reynolds, Types, abstraction and parametric polymorphism, in: Information Processing 83, Proceedings of the IFIP 9th World Computer Congres, 1983, pp. 513-523
  • 29
    • 1242287791 scopus 로고    scopus 로고
    • Andreas Rossberg, Generativity and dynamic opacity for abstract types, in: Proceedings of the 5th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2003, pp. 241-252
  • 30
    • 84955567248 scopus 로고
    • The problem of "weak bisimulation up to"
    • CONCUR '92, Third International Conference on Concurrency Theory, Springer-Verlag
    • Sangiorgi D., and Milner R. The problem of "weak bisimulation up to". CONCUR '92, Third International Conference on Concurrency Theory. Lecture Notes in Computer Science vol. 630 (1992), Springer-Verlag 32-46
    • (1992) Lecture Notes in Computer Science , vol.630 , pp. 32-46
    • Sangiorgi, D.1    Milner, R.2
  • 31
    • 0035030508 scopus 로고    scopus 로고
    • Peter Sewell, Modules, abstract types, and distributed versioning, in: Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2001, pp. 236-247
  • 32
    • 34047140820 scopus 로고    scopus 로고
    • Ian Stark, Names and Higher-Order Functions. Ph.D. Thesis, University of Cambridge, http://homepages.inf.ed.ac.uk/stark/namhof.html, 1994
  • 33
    • 0141751786 scopus 로고    scopus 로고
    • Logical relations for encryption
    • 14th IEEE Computer Security Foundations Workshop, 2001, pp. 256-269 (extended abstract)
    • Sumii E., and Pierce B.C. Logical relations for encryption. Journal of Computer Security 11 4 (2003) 521-554 14th IEEE Computer Security Foundations Workshop, 2001, pp. 256-269 (extended abstract)
    • (2003) Journal of Computer Security , vol.11 , Issue.4 , pp. 521-554
    • Sumii, E.1    Pierce, B.C.2
  • 34
    • 29144437303 scopus 로고    scopus 로고
    • Eijiro Sumii, Benjamin C. Pierce, A bisimulation for type abstraction and recursion, in: Technical Report MS-CIS-04-27, Department of Computer and Information Science, University of Pennsylvania, http://www.kb.ecei.tohoku.ac.jp/~sumii/pub/, 2004. Proceedings of the 32nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2005, pp. 63-74 (extended abstract)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.