English
 
Help Privacy Policy Disclaimer
  Advanced SearchBrowse

Item

ITEM ACTIONSEXPORT
 
 
DownloadE-Mail
  Automated Verification of Selected Equivalences for Security Protocols

Blanchet, B., Abadi, M., & Fournet, C. (2005). Automated Verification of Selected Equivalences for Security Protocols. In 20th IEEE Symposium on Logic in Computer Science (LICS 2005) (pp. 331-340). Los Alamitos, USA: IEEE.

Item is

Files

show Files

Locators

show

Creators

show
hide
 Creators:
Blanchet, Bruno1, Author           
Abadi, Martín, Author
Fournet, Cédric, Author
Affiliations:
1Static Analysis, MPI for Informatics, Max Planck Society, ou_1116553              

Content

show
hide
Free keywords: -
 Abstract: In the analysis of security protocols, methods and tools for reasoning about protocol behaviors have been quite effective. We aim to expand the scope of those methods and tools. We focus on proving equivalences $P \approx Q$ in which $P$ and $Q$ are two processes that differ only in the choice of some terms. These equivalences arise often in applications. We show how to treat them as predicates on the behaviors of a process that represents $P$ and $Q$ at the same time. We develop our techniques in the context of the applied pi calculus and implement them in the tool ProVerif.

Details

show
hide
Language(s): eng - English
 Dates: 2006-04-282005
 Publication Status: Issued
 Pages: -
 Publishing info: Los Alamitos, USA : IEEE
 Table of Contents: -
 Rev. Type: -
 Identifiers: eDoc: 520666
Other: Local-ID: C1256BDD001D715B-4ED43191DFA60AA9C1256FCB0047F288-BlanchetAbadiFournet2005
 Degree: -

Event

show
hide
Title: Untitled Event
Place of Event: Chicago, USA
Start-/End Date: 2005-06-26 - 2005-06-29

Legal Case

show

Project information

show

Source 1

show
hide
Title: 20th IEEE Symposium on Logic in Computer Science (LICS 2005)
Source Genre: Proceedings
 Creator(s):
Affiliations:
Publ. Info: Los Alamitos, USA : IEEE
Pages: - Volume / Issue: - Sequence Number: - Start / End Page: 331 - 340 Identifier: -