Abstract. It is well-known that context-independent control flow anal-ysis can be performed in cubic time for functional and object-oriented languages. Yet recent applications of control flow analysis to calculi of computation (like the pi-calculus and the ambient calculus) have reported considerably higher complexities. In this paper we introduce two general techniques, the use of Horn clauses with sharing and the use of tiling of Horn clauses, for reducing the worst-case complexity of analyses. Ap-plying these techniques to the pi-calculus and the ambient calculus we reduce the complexity from O(n5) to O(n3) in both cases
Abstract. We prove properties of a process calculus that is designed for analysing security protocol...
We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptography” of th...
AbstractWe describe properties of a process calculus that has been developed for the purpose of anal...
Abstract. It is well-known that context-independent control flow anal-ysis can be performed in cubic...
AbstractThe spi-calculus is a variant of the polyadic π-calculus that admits symmetric cryptography ...
The spi-calculus is a variant of the polyadic pi-calculus that admits symmetric cryp-tography and th...
Control Flow Analysis is a static technique for predicting safe and computable approximations to the...
Control Flow Analysis is a static technique for predicting safe and computable approximations to the...
It is known that a static analysis of pi-calculus can be done rather simply and also efficiently, i....
AbstractControl Flow Analysis is a static technique for predicting safe and computable approximation...
We define and study a distributed cryptographic implementation for an asynchronous pi calculus. At t...
Abstract. We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptogra...
We introduce the νspi-calculus that strengthens the notion of “perfect symmetric cryptography” of th...
Interactive behaviors are ubiquitous in modern cryptography, but are also present in λ-calculi, in t...
A variety of program analysis methods have worst case time complexity that grows cubicly in the leng...
Abstract. We prove properties of a process calculus that is designed for analysing security protocol...
We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptography” of th...
AbstractWe describe properties of a process calculus that has been developed for the purpose of anal...
Abstract. It is well-known that context-independent control flow anal-ysis can be performed in cubic...
AbstractThe spi-calculus is a variant of the polyadic π-calculus that admits symmetric cryptography ...
The spi-calculus is a variant of the polyadic pi-calculus that admits symmetric cryp-tography and th...
Control Flow Analysis is a static technique for predicting safe and computable approximations to the...
Control Flow Analysis is a static technique for predicting safe and computable approximations to the...
It is known that a static analysis of pi-calculus can be done rather simply and also efficiently, i....
AbstractControl Flow Analysis is a static technique for predicting safe and computable approximation...
We define and study a distributed cryptographic implementation for an asynchronous pi calculus. At t...
Abstract. We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptogra...
We introduce the νspi-calculus that strengthens the notion of “perfect symmetric cryptography” of th...
Interactive behaviors are ubiquitous in modern cryptography, but are also present in λ-calculi, in t...
A variety of program analysis methods have worst case time complexity that grows cubicly in the leng...
Abstract. We prove properties of a process calculus that is designed for analysing security protocol...
We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptography” of th...
AbstractWe describe properties of a process calculus that has been developed for the purpose of anal...