메뉴 건너뛰기




Volumn 5522 LNCS, Issue , 2009, Pages 182-197

Epistemic logic for the applied Pi calculus

Author keywords

[No Author keywords available]

Indexed keywords

APPLIED PI CALCULUS; ELECTRONIC VOTING; EPISTEMIC LOGIC; MODELING CRYPTOGRAPHIC PROTOCOLS; PI CALCULUS; PROCESS CALCULI; SECURITY PROPERTIES; NATURAL MEANS;

EID: 70349332796     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-02138-1_12     Document Type: Conference Paper
Times cited : (28)

References (21)
  • 1
    • 33750447990 scopus 로고    scopus 로고
    • Deciding knowledge in security protocols under equational theories
    • Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theoretical Computer Science 387(1-2), 2-32 (2006)
    • (2006) Theoretical Computer Science , vol.387 , Issue.1-2 , pp. 2-32
    • Abadi, M.1    Cortier, V.2
  • 3
    • 50249164303 scopus 로고    scopus 로고
    • Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol
    • Backes,M., Maffei,M., Unruh, D.: Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol. In: Proc. 29th IEEE Symposium on Security and Privacy (2008)
    • (2008) Proc. 29th IEEE Symposium on Security and Privacy
    • Backes, M.1    Maffei, M.2    Unruh, D.3
  • 5
    • 0034822279 scopus 로고    scopus 로고
    • An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
    • Blanchet, B.: An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In: Proc. 14th Computer Security Foundations Workshop, pp. 82-96 (2001)
    • (2001) Proc. 14th Computer Security Foundations Workshop , pp. 82-96
    • Blanchet, B.1
  • 9
    • 70349321824 scopus 로고    scopus 로고
    • Chadha, R., Delaune, S., Kremer, S.: Epistemic logic for the applied pi-calculus. Research Report LSV-09-06, Laboratoire Spécification et Vérification, ENS Cachan, France (March 2009)
    • Chadha, R., Delaune, S., Kremer, S.: Epistemic logic for the applied pi-calculus. Research Report LSV-09-06, Laboratoire Spécification et Vérification, ENS Cachan, France (March 2009)
  • 14
    • 68249084846 scopus 로고    scopus 로고
    • Verifying privacy-type properties of electronic voting protocols
    • to appear
    • Delaune, S., Kremer, S., Ryan, M.D.: Verifying privacy-type properties of electronic voting protocols. Journal of Computer Security (2009) (to appear)
    • (2009) Journal of Computer Security
    • Delaune, S.1    Kremer, S.2    Ryan, M.D.3
  • 16
    • 24144492346 scopus 로고    scopus 로고
    • Anonymity and information hiding in multiagent systems
    • Halpern, J.Y., O'Neill, K.R.: Anonymity and information hiding in multiagent systems. Journal of Computer Security 13(3), 483-512 (2005)
    • (2005) Journal of Computer Security , vol.13 , Issue.3 , pp. 483-512
    • Halpern, J.Y.1    O'Neill, K.R.2
  • 17
    • 0344875575 scopus 로고    scopus 로고
    • Information hiding, anonymity and privacy: A modular approach
    • Hughes, D., Shmatikov, V.: Information hiding, anonymity and privacy: a modular approach. Journal of Computer Security 12(1), 3-36 (2004)
    • (2004) Journal of Computer Security , vol.12 , Issue.1 , pp. 3-36
    • Hughes, D.1    Shmatikov, V.2
  • 18
    • 33847685950 scopus 로고    scopus 로고
    • Hüttel, H., Pedersen, M.D.: A logical characterisation of static equivalence. Electr. Notes Theor. Comput. Sci. 173, 139-157 (2007)
    • Hüttel, H., Pedersen, M.D.: A logical characterisation of static equivalence. Electr. Notes Theor. Comput. Sci. 173, 139-157 (2007)
  • 20
    • 33846808999 scopus 로고    scopus 로고
    • Epistemic verification of anonymity. Electr
    • van Eijck, J., Orzan, S.: Epistemic verification of anonymity. Electr. Notes Theor. Comput. Sci. 168, 159-174 (2007)
    • (2007) Notes Theor. Comput. Sci , vol.168 , pp. 159-174
    • van Eijck, J.1    Orzan, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.