A Trace Based Bisimulation for the Spi Calculus: An Extended Abstract
From MaRDI portal
Publication:3498447
Recommendations
Cited in
(14)- Intruder deduction problem for locally stable theories with normal forms and inverses
- On bisimulations for the spi calculus
- Compositional analysis of protocol equivalence in the applied \(\pi \)-calculus using quasi-open bisimilarity
- A Proof Theoretic Analysis of Intruder Theories
- Open bisimulation, revisited
- When privacy fails, a formula describes an attack: a complete and compositional verification method for the applied \(\pi\)-calculus
- Implementing Spi Calculus Using Nominal Techniques
- Analysing privacy-type properties in cryptographic protocols (invited talk)
- On bisimulations for the spi calculus
- Open bisimulation, revisited
- scientific article; zbMATH DE number 7379295 (Why is no real title available?)
- Formalising Observer Theory for Environment-Sensitive Bisimulation
- A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols
- SPEC: an equivalence checker for security protocols
This page was built for publication: A Trace Based Bisimulation for the Spi Calculus: An Extended Abstract
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3498447)