메뉴 건너뛰기




Volumn , Issue , 2007, Pages 140-154

Approximated computationally bounded simulation relations for probabilistic automata

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SIMULATION; POLYNOMIALS; SET THEORY; THEOREM PROVING;

EID: 35048868422     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2007.8     Document Type: Conference Paper
Times cited : (16)

References (26)
  • 1
    • 84879078812 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • IFIP TCS, of, Springer Berlin Heidelberg
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). In IFIP TCS, volume 2000 of Lecture Notes in Computer Science, pages 3-22. Springer Berlin Heidelberg, 2000.
    • (2000) Lecture Notes in Computer Science , vol.2000 , pp. 3-22
    • Abadi, M.1    Rogaway, P.2
  • 2
    • 32844458560 scopus 로고    scopus 로고
    • A universally composable cryptographic library. Cryptology ePrint Archive
    • Report 2003/015
    • M. Backes, B. Pfitzmann, and M. Waidner. A universally composable cryptographic library. Cryptology ePrint Archive, Report 2003/015, 2003.
    • (2003)
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 4
    • 33749579009 scopus 로고    scopus 로고
    • A computationally sound mechanized prover for security protocols. Cryptology ePrint Archive
    • Report 2005/401
    • B. Blanchet. A computationally sound mechanized prover for security protocols. Cryptology ePrint Archive, Report 2005/401, 2005.
    • (2005)
    • Blanchet, B.1
  • 5
    • 33749550797 scopus 로고    scopus 로고
    • Automated security proofs with sequences of games. Cryptology ePrint Archive
    • Report 2006/069
    • B. Blanchet and D. Pointcheval. Automated security proofs with sequences of games. Cryptology ePrint Archive, Report 2006/069, 2006.
    • (2006)
    • Blanchet, B.1    Pointcheval, D.2
  • 7
    • 33947639009 scopus 로고    scopus 로고
    • Using Probabilistic I/O Automata to analyze an oblivious transfer protocol
    • Technical Report 2005/452, Cryptology ePrint Archive, 2005
    • R. Canetti, L. Cheung, D. Kaynar, M. Liskov, N. Lynch, O. Pereira, and R. Segala. Using Probabilistic I/O Automata to analyze an oblivious transfer protocol. Technical Report 2005/452, Cryptology ePrint Archive, 2005.
    • Canetti, R.1    Cheung, L.2    Kaynar, D.3    Liskov, M.4    Lynch, N.5    Pereira, O.6    Segala, R.7
  • 8
    • 33845213035 scopus 로고    scopus 로고
    • Time-bounded task-PIOAs: A framework for analyzing security protocols
    • 20th International Symposium on Distributed Computing DISC 2006, of, Springer Berlin Heidelberg
    • R. Canetti, L. Cheung, D. Kaynar, M. Liskov, N. Lynch, O. Pereira, and R. Segala. Time-bounded task-PIOAs: A framework for analyzing security protocols. In 20th International Symposium on Distributed Computing (DISC 2006), volume 4167 of Lecture Notes in Computer Science, pages 238-253. Springer Berlin Heidelberg, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4167 , pp. 238-253
    • Canetti, R.1    Cheung, L.2    Kaynar, D.3    Liskov, M.4    Lynch, N.5    Pereira, O.6    Segala, R.7
  • 10
    • 33750295660 scopus 로고    scopus 로고
    • Foundations of Cryptography
    • Cambridge University Press
    • O. Goldreich. Foundations of Cryptography: Volume 1, Basic Tools. Cambridge University Press, 2001.
    • (2001) Basic Tools , vol.1
    • Goldreich, O.1
  • 11
    • 33645593031 scopus 로고    scopus 로고
    • Foundations of Cryptography
    • Cambridge University Press
    • O. Goldreich. Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press, 2004.
    • (2004) Basic Applications , vol.2
    • Goldreich, O.1
  • 12
    • 24644476184 scopus 로고    scopus 로고
    • Completing the picture: Soundness of formal encryption in the presence of active adversaries
    • Technical Report TR-2004-19, Verimag
    • R. Janvier, Y. Lakhnech, and L. Mazare. Completing the picture: Soundness of formal encryption in the presence of active adversaries. Technical Report TR-2004-19, Verimag, 2005.
    • (2005)
    • Janvier, R.1    Lakhnech, Y.2    Mazare, L.3
  • 13
    • 84958052989 scopus 로고    scopus 로고
    • Probabilistic polynomial-time equivalence and security analysis
    • FM '99: Proceedings of the World Congress on Formal Methods in the Development of Computing Systems-1708 of, Springer Berlin Heidelberg
    • P. Lincoln, J. C. Mitchell, M. Mitchell, and A. Scedrov. Probabilistic polynomial-time equivalence and security analysis. In FM '99: Proceedings of the World Congress on Formal Methods in the Development of Computing Systems-Volume I, volume 1708 of Lecture Notes in Computer Science, pages 776-793. Springer Berlin Heidelberg, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1 , pp. 776-793
    • Lincoln, P.1    Mitchell, J.C.2    Mitchell, M.3    Scedrov, A.4
  • 16
    • 0344875571 scopus 로고    scopus 로고
    • Completeness theorems for the Abadi-Rogaway logic of encrypted expressions
    • D. Micciancio and B. Warinschi. Completeness theorems for the Abadi-Rogaway logic of encrypted expressions. Journal of Computer Security, 12(1):99-129, 2004.
    • (2004) Journal of Computer Security , vol.12 , Issue.1 , pp. 99-129
    • Micciancio, D.1    Warinschi, B.2
  • 17
  • 18
    • 33244491452 scopus 로고    scopus 로고
    • A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols
    • J. C. Mitchell, A. Ramanathan, A. Scedrov, and V. Teague. A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols. Theoretical Computer Science, 353(1):118-164, 2006.
    • (2006) Theoretical Computer Science , vol.353 , Issue.1 , pp. 118-164
    • Mitchell, J.C.1    Ramanathan, A.2    Scedrov, A.3    Teague, V.4
  • 21
    • 0034823388 scopus 로고    scopus 로고
    • A model for asynchronous reactive systems and its application to secure message transmission
    • IEEE Computer Society
    • B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In SP '01: Proceedings of the 2001 IEEE Symposium on Security and Privacy, pages 184-200. IEEE Computer Society, 2001.
    • (2001) SP '01: Proceedings of the 2001 IEEE Symposium on Security and Privacy , pp. 184-200
    • Pfitzmann, B.1    Waidner, M.2
  • 22
    • 35048834604 scopus 로고    scopus 로고
    • R. Segala. Modeling and Verification of Randomized Distributed Real-Time Systems. PhD thesis, Department of Electrical Engineering and Computer Science, MIT, 1995. Also appears as technical report MIT/LCS/TR-676.
    • R. Segala. Modeling and Verification of Randomized Distributed Real-Time Systems. PhD thesis, Department of Electrical Engineering and Computer Science, MIT, 1995. Also appears as technical report MIT/LCS/TR-676.
  • 23
    • 33749562781 scopus 로고    scopus 로고
    • Probability and nondeterminism in operational models of concurrency
    • CONCUR 2006, Concurrency Theory, of, Springer Berlin Heidelberg
    • R. Segala. Probability and nondeterminism in operational models of concurrency. In CONCUR 2006 - Concurrency Theory, volume 4137 of Lecture Notes in Computer Science, pages 64-78. Springer Berlin Heidelberg, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4137 , pp. 64-78
    • Segala, R.1
  • 24
    • 0001609136 scopus 로고
    • Probabilistic simulations for probabilistic processes
    • R. Segala and N. Lynch. Probabilistic simulations for probabilistic processes. Nordic Journal of Computing, 2(2):250-273, 1995.
    • (1995) Nordic Journal of Computing , vol.2 , Issue.2 , pp. 250-273
    • Segala, R.1    Lynch, N.2
  • 25
    • 33745142417 scopus 로고    scopus 로고
    • A tool for taming complexity in security proofs. Cryptology ePrint Archive
    • Report 2004/332
    • V. Shoup. A tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004/332, 2004.
    • (2004)
    • Shoup, V.1
  • 26
    • 21144435765 scopus 로고    scopus 로고
    • Probabilistic automata: System types, parallel composition and comparison
    • Validation of Stochastic Systems: A Guide to Current Research, of, Springer Verlag Heidelberg
    • A. Sokolova and E. P. de Vink. Probabilistic automata: System types, parallel composition and comparison. In Validation of Stochastic Systems: A Guide to Current Research, volume 2925 of Lecture Notes in Computer Science, pages 1-43. Springer Verlag Heidelberg, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2925 , pp. 1-43
    • Sokolova, A.1    de Vink, E.P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.