Sciweavers

18 search results - page 1 / 4
» An Open Approach for the Applied Pi Calculus
Sort
View
JSW
2008
110views more  JSW 2008»
13 years 4 months ago
An Open Approach for the Applied Pi Calculus
A notion of open bisimulation is proposed for the Applied Pi Calculus, which extends -calculus in order to facilitate analyzing security protocols. Our notion is based on the label...
Han Zhu, Yonggen Gu, Xiaohong Wu
FOSSACS
2004
Springer
13 years 10 months ago
Strong Bisimulation for the Explicit Fusion Calculus
The pi calculus holds the promise of compile-time checks for whether a given program will have the correct interactive behaviour. The theory behind such checks is called bisimulati...
Lucian Wischik, Philippa Gardner
FORTE
2009
13 years 2 months ago
Epistemic Logic for the Applied Pi Calculus
We propose an epistemic logic for the applied pi calculus, which is a variant of the pi calculus with extensions for modeling cryptographic protocols. In such a calculus, the secur...
Rohit Chadha, Stéphanie Delaune, Steve Krem...
TCS
2010
13 years 3 months ago
On the expressiveness of interaction
Subbisimilarity is proposed as a general tool to classify the relative expressive power of process calculi. The expressiveness of several variants of CCS is compared in terms of t...
Yuxi Fu, Hao Lu
ACNS
2007
Springer
105views Cryptology» more  ACNS 2007»
13 years 11 months ago
Analyzing an Electronic Cash Protocol Using Applied Pi Calculus
Abstract. Untraceability and unreuseability are essential security properties for electronic cash protocols. Many protocols have been proposed to meet these two properties. However...
Zhengqin Luo, Xiaojuan Cai, Jun Pang, Yuxin Deng