• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

DMCA

Automated verification of selected equivalences for security protocols (2005)

Cached

  • Download as a PDF

Download Links

  • [www.di.ens.fr]
  • [prosecco.gforge.inria.fr]
  • [research.microsoft.com]
  • [research.microsoft.com]
  • [research.microsoft.com]
  • [research.microsoft.com]
  • [research.microsoft.com]
  • [www.cse.ucsc.edu]
  • [www.di.ens.fr]
  • [www.cs.ucsc.edu]
  • [users.soe.ucsc.edu]
  • [prosecco.gforge.inria.fr]
  • [www.cse.ucsc.edu]
  • [www.cs.ucsc.edu]
  • [users.soe.ucsc.edu]

  • Other Repositories/Bibliography

  • DBLP
  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Bruno Blanchet, et al.
Venue:IN 20TH IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE (LICS’05
Citations:103 - 12 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@INPROCEEDINGS{Blanchet05automatedverification,
    author = {Bruno Blanchet and et al.},
    title = {Automated verification of selected equivalences for security protocols},
    booktitle = {IN 20TH IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE (LICS’05},
    year = {2005},
    pages = {331--340},
    publisher = {IEEE Comp. Soc. Press}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

In the analysis of security protocols, methods and tools for reasoning about protocol behaviors have been quite effective. We aim to expand the scope of those methods and tools. We focus on proving equivalences P ≈ Q in which P and Q are two processes that differ only in the choice of some terms. These equivalences arise often in applications. We show how to treat them as predicates on the behaviors of a process that represents P and Q at the same time. We develop our techniques in the context of the applied pi calculus and implement them in the tool ProVerif.

Keyphrases

security protocol    tool proverif    protocol behavior    applied pi calculus   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University