Security protocols are designed to meet particular security properties. In order to analyse such protocols formally, it is necessary to provide a formal definition of the property that they are intended to provide. This paper is concerned with the property of anonymity. It proposes a definition of anonymity within the CSP notation, discusses the approach taken by CSP to anonymity with respect to different viewpoints, and illustrates this approach on some toy examples, and then applies it to a machine-assisted analysis of the dining cryptographers example and some variants
Abstract. Security protocols play more and more important role with widely use in many applications ...
AbstractAnonymity means that the identity of the user performing a certain action is maintained secr...
Cryptographic protocols aim at securing communications over insecure networks such as the Internet, ...
. Security protocols are designed to meet particular security properties. In order to analyse such p...
We introduce the notion of parameterised anonymity, to formalize the anonymity property of protocols...
We consider several notions of anonymity and privacy and develop formal definitions of what it mean...
Abstract. We present formal definitions of anonymity for voting protocols using the process algebra ...
We present a powerful and flexible method for automatically checking anonymity in a possibilistic ge...
Abstract—In this paper we review a wide range of existing definitions for anonymity defined in diffe...
International audienceNowadays, it is a well-known fact that only formal methods can provide a proof...
We propose a framework in which anonymity protocols are interpreted as particular kinds of channels,...
technical reportWe present a formal definition of anonymity in the context of concurrent processes. ...
Security properties such as confidentiality and authenticity may be considered in terms of the flow ...
The use of formal methods to verify security protocols with respect to secrecy and authentication ha...
Security properties such as condentiality and au thenticity may be considered in terms of the ow of ...
Abstract. Security protocols play more and more important role with widely use in many applications ...
AbstractAnonymity means that the identity of the user performing a certain action is maintained secr...
Cryptographic protocols aim at securing communications over insecure networks such as the Internet, ...
. Security protocols are designed to meet particular security properties. In order to analyse such p...
We introduce the notion of parameterised anonymity, to formalize the anonymity property of protocols...
We consider several notions of anonymity and privacy and develop formal definitions of what it mean...
Abstract. We present formal definitions of anonymity for voting protocols using the process algebra ...
We present a powerful and flexible method for automatically checking anonymity in a possibilistic ge...
Abstract—In this paper we review a wide range of existing definitions for anonymity defined in diffe...
International audienceNowadays, it is a well-known fact that only formal methods can provide a proof...
We propose a framework in which anonymity protocols are interpreted as particular kinds of channels,...
technical reportWe present a formal definition of anonymity in the context of concurrent processes. ...
Security properties such as confidentiality and authenticity may be considered in terms of the flow ...
The use of formal methods to verify security protocols with respect to secrecy and authentication ha...
Security properties such as condentiality and au thenticity may be considered in terms of the ow of ...
Abstract. Security protocols play more and more important role with widely use in many applications ...
AbstractAnonymity means that the identity of the user performing a certain action is maintained secr...
Cryptographic protocols aim at securing communications over insecure networks such as the Internet, ...