Sciweavers

34 search results - page 4 / 7
» Symbolic protocol analysis for monoidal equational theories
Sort
View
VTC
2008
IEEE
110views Communications» more  VTC 2008»
14 years 3 days ago
Performance Analysis on Maximum Likelihood Detection for Two Input Multiple Output Systems
-This paper addresses the problem of performance analysis for maximum likelihood (ML) detection in two-input multiple-output multiplexing systems. A novel analytical method is pres...
Wei Peng, Shaodan Ma, Tung-Sang Ng, Jiangzhou Wang...
IFIP
2010
Springer
13 years 18 days ago
Efficient Decision Procedures for Message Deducibility and Static Equivalence
Abstract. We consider two standard notions in formal security protocol analysis: message deducibility and static equivalence under equational theories. We present polynomial-time a...
Bruno Conchinha, David A. Basin, Carlos Caleiro
TPHOL
2009
IEEE
14 years 11 days ago
Formalising Observer Theory for Environment-Sensitive Bisimulation
Abstract. We consider a formalisation of a notion of observer (or intruder) theories, commonly used in symbolic analysis of security protocols. An observer theory describes the kno...
Jeremy E. Dawson, Alwen Tiu
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 3 months ago
A Proof Theoretic Analysis of Intruder Theories
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages under the theory of ...
Alwen Tiu, Rajeev Goré, Jeremy E. Dawson
ICALP
2005
Springer
13 years 11 months ago
Combining Intruder Theories
Abstract. Most of the decision procedures for symbolic analysis of protocols are limited to a fixed set of algebraic operators associated with a fixed intruder theory. Examples o...
Yannick Chevalier, Michaël Rusinowitch