scientific article; zbMATH DE number 7379295
From MaRDI portal
Publication:5009710
DOI10.23638/LMCS-17(2:24)2021MaRDI QIDQ5009710
Publication date: 5 August 2021
Full work available at URL: https://arxiv.org/abs/2002.07309
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (4)
Compositional analysis of protocol equivalence in the applied \(\pi \)-calculus using quasi-open bisimilarity ⋮ When privacy fails, a formula describes an attack: a complete and compositional verification method for the applied \(\pi\)-calculus ⋮ Unnamed Item ⋮ Unnamed Item
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Symbolic bisimulations
- Modal logics for mobile processes
- Injective synchronisation: An extension of the authentication hierarchy
- On a new formal proof model for RFID location privacy
- A calculus for cryptographic protocols: The spi calculus
- A complete symbolic bisimulation for full applied pi calculus
- Reconciling real and stochastic time: the need for probabilistic refinement
- The Hitchhiker's guide to decidability and complexity of equivalence properties in security protocols
- Open bisimulation, revisited
- Real time process algebra
- Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping
- Expressiveness modulo bisimilarity of regular expressions with parallel composition
- The Applied Pi Calculus
- SPEC: An Equivalence Checker for Security Protocols
- Security Analysis of the PACE Key-Agreement Protocol
- A Trace Based Bisimulation for the Spi Calculus: An Extended Abstract
- Characterising Testing Preorders for Finite Probabilistic Processes
- Ready-Trace Semantics for Concrete Process Algebra with the Priority Operator
- Outline of a Theory of Truth
- Divergence and unique solution of equations
- Quasi-Open Bisimilarity with Mismatch is Intuitionistic
- A Complete Axiomatisation of Branching Bisimulation for Probabilistic Systems with an Application in Protocol Verification
- A Proof Theoretic Analysis of Intruder Theories
This page was built for publication: