Evaluation of anonymity and confidentiality protocols using theorem proving
From MaRDI portal
Publication:5962971
DOI10.1007/S10703-015-0232-5zbMATH Open1331.68028OpenAlexW840673086MaRDI QIDQ5962971FDOQ5962971
Authors: Tarek Mhamdi, Osman Hasan, Sofiène Tahar
Publication date: 25 February 2016
Published in: Formal Methods in System Design (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10703-015-0232-5
Recommendations
- A formalization of anonymity and onion routing
- Formalizing provable anonymity in Isabelle/HOL
- Formal analysis of the information leakage of the DC-nets and crowds anonymity protocols
- Modular verification of protocol equivalence in the presence of randomness
- Analyzing anonymity attacks through noisy channels
Data encryption (aspects in computer science) (68P25) Information theory (general) (94A15) Network protocols (68M12)
Cites Work
- A theory of type polymorphism in programming
- An introduction to mathematical logic and type theory: To truth through proof.
- Title not available (Why is that?)
- Title not available (Why is that?)
- On the formalization of the Lebesgue integration theory in HOL
- Assessing security threats of looping constructs
- On the Foundations of Quantitative Information Flow
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Formalization of entropy measures in HOL
- Anonymity Protocols as Noisy Channels
- Title not available (Why is that?)
Cited In (3)
Uses Software
This page was built for publication: Evaluation of anonymity and confidentiality protocols using theorem proving
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5962971)