A Trace Based Bisimulation for the Spi Calculus: An Extended Abstract
From MaRDI portal
Publication:3498447
DOI10.1007/978-3-540-76637-7_25zbMath1137.68455OpenAlexW1568775940MaRDI QIDQ3498447
Publication date: 15 May 2008
Published in: Programming Languages and Systems (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-76637-7_25
Cryptography (94A60) Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85)
Related Items (9)
Compositional analysis of protocol equivalence in the applied \(\pi \)-calculus using quasi-open bisimilarity ⋮ SPEC: An Equivalence Checker for Security Protocols ⋮ Formalising Observer Theory for Environment-Sensitive Bisimulation ⋮ When privacy fails, a formula describes an attack: a complete and compositional verification method for the applied \(\pi\)-calculus ⋮ Unnamed Item ⋮ Unnamed Item ⋮ A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols ⋮ Intruder deduction problem for locally stable theories with normal forms and inverses ⋮ A Proof Theoretic Analysis of Intruder Theories
This page was built for publication: A Trace Based Bisimulation for the Spi Calculus: An Extended Abstract