2013
DOI: 10.1016/j.future.2012.02.001
|View full text |Cite
|
Sign up to set email alerts
|

Reasoning about minimal anonymity in security protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
23
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(23 citation statements)
references
References 13 publications
0
23
0
Order By: Relevance
“… at ARES 2011 conference, the main interest was related to the complementarity between the behavioral equivalence, defined in the referenced paper and the observational equivalence presented in Refs. and . This article answers the questions that were addressed there and to sum up the core of the epistemic logic used in Ref.…”
Section: Introductionmentioning
confidence: 81%
“… at ARES 2011 conference, the main interest was related to the complementarity between the behavioral equivalence, defined in the referenced paper and the observational equivalence presented in Refs. and . This article answers the questions that were addressed there and to sum up the core of the epistemic logic used in Ref.…”
Section: Introductionmentioning
confidence: 81%
“…[6] and [11] focus on anonymity in security protocols and multi-agent systems, respectively, by using an epistemic logic framework. These two papers have greatly influenced the research on anonymity based on an epistemic logic formalism [12], [15], [20], [24], [25], [26]. The roots of our paper can be traced back to these two papers too.…”
Section: Introductionmentioning
confidence: 90%
“…O VER the last two decades there has been a growing interest in methods for anonymous communication and in developing techniques for reasoning about information hiding properties in security protocols [1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18], [19], [20], [21], [22], [23], [24], [25], [26]. This is mainly due to the applications of the anonymous communication to various fields such as e-voting, e-commerce, e-mail, e-cash and so on.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations