Recent approaches to the analysis of crypto-protocols build on concepts which are well-established in the field of process algebras, such as labelled transition systems (lts) and observational semantics. We outline some recent work in this direction that stems from using cryptographic versions of the pi-calculus -- most notably Abadi and Gordon's spi-calculus -- as protocol description languages. We show the impact of these approaches on a specific example, a simplified version of the Kerberos protocol
Abstract. We prove properties of a process calculus that is designed for analysing security protocol...
In security protocols, message exchange between the intruder and honest participants induces a form ...
AbstractWe introduce the spi calculus, an extension of the pi calculus designed for describing and a...
AbstractWe introduce the spi calculus, an extension of the pi calculus designed for describing and a...
Abstract. A cryptographic protocol can be described as a system of concurrent processes, and analysi...
Two process algebraic approaches for the analysis of cryptographic protocols, namely the spi calculu...
Two process algebraic approaches for the analysis of cryptographic protocols, namely the spi calculu...
Crypto-CCS is a formal description language for distributed protocols which is suitable to abstractl...
Abstract. A cryptographic protocol can be described as a system of concurrent processes, and analysi...
Abstract. Properties of security protocols such as authentication and secrecy are often verified by ...
A real-time process algebra, enhanced with specific constructs for handling cryptographic primitives...
Recently there has been much interest towards using formal methods in the analysis of security proto...
We propose a methodology for the formal analysis of security protocols. This originates from the obs...
Properties of security protocols such as authentication and secrecy are often verified by explictly ...
AbstractWe describe properties of a process calculus that has been developed for the purpose of anal...
Abstract. We prove properties of a process calculus that is designed for analysing security protocol...
In security protocols, message exchange between the intruder and honest participants induces a form ...
AbstractWe introduce the spi calculus, an extension of the pi calculus designed for describing and a...
AbstractWe introduce the spi calculus, an extension of the pi calculus designed for describing and a...
Abstract. A cryptographic protocol can be described as a system of concurrent processes, and analysi...
Two process algebraic approaches for the analysis of cryptographic protocols, namely the spi calculu...
Two process algebraic approaches for the analysis of cryptographic protocols, namely the spi calculu...
Crypto-CCS is a formal description language for distributed protocols which is suitable to abstractl...
Abstract. A cryptographic protocol can be described as a system of concurrent processes, and analysi...
Abstract. Properties of security protocols such as authentication and secrecy are often verified by ...
A real-time process algebra, enhanced with specific constructs for handling cryptographic primitives...
Recently there has been much interest towards using formal methods in the analysis of security proto...
We propose a methodology for the formal analysis of security protocols. This originates from the obs...
Properties of security protocols such as authentication and secrecy are often verified by explictly ...
AbstractWe describe properties of a process calculus that has been developed for the purpose of anal...
Abstract. We prove properties of a process calculus that is designed for analysing security protocol...
In security protocols, message exchange between the intruder and honest participants induces a form ...
AbstractWe introduce the spi calculus, an extension of the pi calculus designed for describing and a...