A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
EVALUATION TECHNIQUE IN THE SPICALCULUS FOR CRYPTOGRAPHIC PROTOCOLS
2009
unpublished
Bisimulation as a technique could be well invested for proving authenticity and secrecy properties of cryptographic protocols to gain the legality of protocol optimization. In this paper, we will do some changes in the spi-calculus after the original work of M.Abadi and A.Gordan. Then we will introduce evade bisimulation following Abadi and Gordan's framed bisimulation proposal, in which a convenient proof technique is presented. It will impose minimality requirements on the environment and
doi:10.14236/ewic/isiict2009.9
fatcat:tppmc5ejkvajzgyvjmfsep6oni