메뉴 건너뛰기




Volumn 18, Issue 2, 2010, Pages 317-377

Symbolic bisimulation for the applied pi calculus

Author keywords

Applied pi calculus; Observational equivalence; Security protocols

Indexed keywords

APPLIED PI CALCULUS; BISIMULATION RELATIONS; BISIMULATIONS; CRYPTOGRAPHIC PROTOCOLS; OBSERVATIONAL EQUIVALENCES; PI CALCULUS; SECRECY PROPERTIES; SECURITY PROTOCOLS; SYMBOLIC BISIMULATION; SYMBOLIC SEMANTICS;

EID: 77950191447     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2010-0363     Document Type: Article
Times cited : (23)

References (21)
  • 1
    • 33750447990 scopus 로고    scopus 로고
    • Deciding knowledge in security protocols under equational theories
    • M. Abadi and V. Cortier, Deciding knowledge in security protocols under equational theories, Theoretical Computer Science 387(1,2) (2006), 2-32.
    • (2006) Theoretical Computer Science , vol.387 , Issue.1-2 , pp. 2-32
    • Abadi, M.1    Cortier, V.2
  • 4
    • 0037209773 scopus 로고    scopus 로고
    • On the symbolic reduction of processes with cryptographic functions
    • R. Amadio, D. Lugiez and V. Vanackère, On the symbolic reduction of processes with cryptographic functions, Theoretical Computer Science 290 (2002), 695-740.
    • (2002) Theoretical Computer Science , vol.290 , pp. 695-740
    • Amadio, R.1    Lugiez, D.2    Vanackère, V.3
  • 7
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • IEEE Comp. Soc. Press
    • B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, in: Proc. 14th Computer Security Foundations Workshop, IEEE Comp. Soc. Press, 2001, pp. 82-96.
    • (2001) Proc. 14th Computer Security Foundations Workshop , pp. 82-96
    • Blanchet, B.1
  • 8
    • 26844508455 scopus 로고    scopus 로고
    • Automated verification of selected equivalences for security protocols
    • IEEE Comp. Soc. Press
    • B. Blanchet, M. Abadi and C. Fournet, Automated verification of selected equivalences for security protocols, in: Proc. 20th Symposium on Logic in Computer Science, IEEE Comp. Soc. Press, 2005, pp. 331-340.
    • (2005) Proc. 20th Symposium on Logic in Computer Science , pp. 331-340
    • Blanchet, B.1    Abadi, M.2    Fournet, C.3
  • 10
    • 35048863862 scopus 로고    scopus 로고
    • Symbolic bisimulation in the spi calculus
    • Lecture Notes in Computer Science, Springer
    • J. Borgström, S. Briais and U. Nestmann, Symbolic bisimulation in the spi calculus, in: Proc. 15th Int. Conference on Concurrency Theory, Lecture Notes in Computer Science, Vol.3170, Springer, 2004, pp. 161-176.
    • (2004) Proc. 15th Int. Conference on Concurrency Theory , vol.3170 , pp. 161-176
    • Borgström, J.1    Briais, S.2    Nestmann, U.3
  • 15
    • 77950279302 scopus 로고    scopus 로고
    • Symbolic bisimulation for the applied pi calculus
    • Laboratoire Spécification et Vérification, ENS Cachan, France
    • S. Delaune, S. Kremer and M.D. Ryan, Symbolic bisimulation for the applied pi calculus, Research Report LSV-08-32, Laboratoire Spécification et Vérification, ENS Cachan, France, 2008, 73 pp.
    • (2008) Research Report LSV-08-32 , pp. 73
    • Delaune, S.1    Kremer, S.2    Ryan, M.D.3
  • 17
    • 0001292443 scopus 로고
    • A practical secret voting scheme for large scale elections
    • Lecture Notes in Computer Science, Springer
    • A. Fujioka, T. Okamoto and K. Ohta, A practical secret voting scheme for large scale elections, in: Advances in Cryptology - AUSCRYPT '92, Lecture Notes in Computer Science, Vol.718, Springer, 1992, pp. 244-251.
    • (1992) Advances in Cryptology - AUSCRYPT '92 , vol.718 , pp. 244-251
    • Fujioka, A.1    Okamoto, T.2    Ohta, K.3
  • 19
    • 23144432349 scopus 로고    scopus 로고
    • Analysis of an electronic voting protocol in the applied pi-calculus
    • Lecture Notes in Computer Science, Springer
    • S. Kremer and M.D. Ryan, Analysis of an electronic voting protocol in the applied pi-calculus, in: Proc. 14th European Symposium on Programming, Lecture Notes in Computer Science, Vol.3444, Springer, 2005, pp. 186-200.
    • (2005) Proc. 14th European Symposium on Programming , vol.3444 , pp. 186-200
    • Kremer, S.1    Ryan, M.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.