2005
DOI: 10.1016/j.jlap.2004.09.006
|View full text |Cite
|
Sign up to set email alerts
|

A static analysis of cryptographic processes: the denotational approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
14
0

Year Published

2005
2005
2018
2018

Publication Types

Select...
5
1

Relationship

5
1

Authors

Journals

citations
Cited by 12 publications
(15 citation statements)
references
References 14 publications
1
14
0
Order By: Relevance
“…Setting k > 3 also generates more copies and therefore more duplicates. This can be shown as a result of the safety of the analysis, as was proven in [28,29,30,31]. Furthermore, it is worth mentioning that for the case of QoS=1, we never obtain a result where the number of published messages is zero (under either condition of no attacker/attacker).…”
Section: Qos = 1 Protocolsupporting
confidence: 56%
See 1 more Smart Citation
“…Setting k > 3 also generates more copies and therefore more duplicates. This can be shown as a result of the safety of the analysis, as was proven in [28,29,30,31]. Furthermore, it is worth mentioning that for the case of QoS=1, we never obtain a result where the number of published messages is zero (under either condition of no attacker/attacker).…”
Section: Qos = 1 Protocolsupporting
confidence: 56%
“…Finally, ⊥ D = φ 0 is the empty environment where ∀x ∈ N : φ 0 (x) = {}. We also defined in [27] an abstract interpretation based on D ⊥ , which was shown to be safe with respect to the name-substitution semantics, in similar fashion to previous analyses we defined for different variations of the π-calculus [28,29,30]. Later in Section 5, we apply this abstract interpretation to the model of the MQTT protocol introduced in the next Section 4.…”
Section: Syntax and Structural Operational Semantics Of Tpimentioning
confidence: 99%
“…In this section, we define a domain-theoretic semantics for the SPIKY language that is based on the model of processes originally defined by Stark [34] for the π-calculus and that was further extended for the case of the spi-calculus in [7] to deal with cryptographic processes. Our new model is based on the following IN IT , (xa, xb, xs, xch, xch ) (νna)xch xa, na .xch(xb , xn b , xsig).…”
Section: A Domain-theoretic Modelmentioning
confidence: 99%
“…These elements are defined in Figure 7, where K is the set underlying any (pre)domain. Clearly from the definition of Figure 7, the domain Spiky ⊥ is a to similar treatments in [3,7]). The definition of this multiset utilises the usual multiset operations such as the empty multiset, ∅, the singleton multiset, {||}, and the union of multisets, .…”
Section: A Domain-theoretic Modelmentioning
confidence: 99%
See 1 more Smart Citation