Mobile values, new names, and secure communication

From MaRDI portal
Publication:5178877

DOI10.1145/360204.360213zbMath1323.68398OpenAlexW1973054120MaRDI QIDQ5178877

Martín Abadi, Cédric Fournet

Publication date: 17 March 2015

Published in: Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/360204.360213




Related Items (only showing first 100 items - show all)

Compositional analysis of protocol equivalence in the applied \(\pi \)-calculus using quasi-open bisimilarityDeclarative event based models of concurrency and refinement in psi-calculiPrivate authenticationAlgorithmic problems in the symbolic approach to the verification of automatically synthesized cryptosystemsA probabilistic polynomial-time process calculus for the analysis of cryptographic protocolsModel Checking Security ProtocolsA closer look at constraints as processesA Behavioural Theory for a π-calculus with PreordersMoving the bar on computationally sound exclusive-orFormalising Observer Theory for Environment-Sensitive BisimulationAlice and Bob: Reconciling Formal Models and ImplementationDeciding knowledge in security protocols under equational theoriesA framework for security analysis of mobile wireless networksDecision procedures for the security of protocols with probabilistic encryption against offline dictionary attacksStateful applied pi calculus: observational equivalence and labelled bisimilarityModular verification of protocol equivalence in the presence of randomnessPOR for security protocol equivalences. Beyond action-determinismEfficiently deciding equivalence for standard primitives and phasesFormal analysis and offline monitoring of electronic examsModels for name-passing processes: Interleaving and causalTypes for Secure Pattern Matching with Local Knowledge in Universal Concurrent Constraint ProgrammingA game-theoretic framework for specification and verification of cryptographic protocolsEmerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years LaterDeciding equivalence-based properties using constraint solvingA Probabilistic Applied Pi–CalculusDeciding Knowledge in Security Protocols for Monoidal Equational TheoriesA behavioural theory for a \(\pi\)-calculus with preordersUnnamed ItemA pure labeled transition semantics for the applied pi calculusOn the existence and decidability of unique decompositions of processes in the applied \(\pi\)-calculusTo know or not to know: Epistemic approaches to security protocol verificationTree automata with equality constraints modulo equational theoriesReducing equational theories for the decision of static equivalenceDecidability of equivalence of symbolic derivationsComputing knowledge in security protocols under convergent equational theoriesDecidability and combination results for two notions of knowledge in security protocolsFormally sound implementations of security protocols with JavaSPIComputing strong and weak bisimulations for psi-calculiModeling and verifying ad hoc routing protocolsDeducibility constraints and blind signaturesA Secure Group-Based AKA Protocol for Machine-Type CommunicationsA Spatial Equational Logic for the Applied π-CalculusChallenges in the Automated Verification of Security ProtocolsComputing knowledge in equational extensions of subterm convergent theoriesParametric synchronizations in mobile nominal calculiA Testing Theory for a Higher-Order Cryptographic LanguageImprovement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart cardAutomated Verification of Dynamic Root of Trust ProtocolsOn Communication Models When Verifying Equivalence PropertiesA formal semantics for protocol narrationsFormal methods for web securityA survey of symbolic methods for establishing equivalence-based properties in cryptographic protocolsCryptographic protocol logic: satisfaction for (timed) Dolev-Yao cryptographyIntruder deduction problem for locally stable theories with normal forms and inversesAutomated verification of selected equivalences for security protocolsFree-algebra models for the \(\pi \)-calculusComposition of password-based protocolsThe \(C_\pi\)-calculus: a model for confidential name passingA Probabilistic Polynomial-time Calculus For Analysis of Cryptographic ProtocolsA complete symbolic bisimulation for full applied pi calculusA Complete Symbolic Bisimilarity for an Extended Spi CalculusFair multi-party contract signing using private contract signaturesSecurity Abstractions and Intruder Models (Extended Abstract)A Calculus for Mobile Ad-hoc Networks with Static Location BindingEncoding cryptographic primitives in a calculus with polyadic synchronisationRigid tree automata and applicationsVerification of Correspondence Assertions in a Calculus for Mobile Ad Hoc NetworksA procedure for deciding symbolic equivalence between sets of constraint systemsA method for symbolic analysis of security protocolsA hierarchy of equivalences for asynchronous calculiSymbolic protocol analysis in the union of disjoint intruder theories: combining decision proceduresSafe abstractions of data encodings in formal security protocol modelsPattern-matching spi-calculusComputing Knowledge in Security Protocols under Convergent Equational TheoriesA spatial equational logic for the applied \(\pi \)-calculusA decidable class of security protocols for both reachability and equivalence propertiesPRISMA: A Mobile Calculus with Parametric SynchronizationFormal Analysis of Dynamic, Distributed File-System Access ControlsBisimulation for Demonic SchedulersRigid Tree AutomataOpen Bisimulation for the Concurrent Constraint Pi-CalculusSymbolic Bisimulation for the Applied Pi CalculusFormal analysis of security protocols for wireless sensor networksAutomated Verification of Equivalence Properties of Cryptographic ProtocolsComputationally sound implementations of equational theories against passive adversariesCombining proverif and automated theorem provers for security protocol verificationYAPA: A Generic Tool for Computing Intruder KnowledgeOn the relationships between notions of simulation-based securityAn Epistemic Predicate CTL* for Finite Control π-ProcessesA Symbolic Framework to Analyse Physical Proximity in Security ProtocolsDeciding knowledge in security protocols under some e-voting theoriesBroadcast Psi-calculi with an Application to Wireless ProtocolsA Sorted Semantic Framework for Applied Process Calculi (Extended Abstract)Dynamic management of capabilities in a network aware coordination languageA Formal Analysis of Complex Type Flaw Attacks on Security ProtocolsComputationally Sound Symbolic Analysis of Probabilistic Protocols with Ideal SetupsAutomatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerifProtocol Composition Logic (PCL)A Logical Characterisation of Static EquivalenceA Coq Library for Verification of Concurrent Programs




This page was built for publication: Mobile values, new names, and secure communication