2007
DOI: 10.1016/j.ipl.2006.06.016
|View full text |Cite
|
Sign up to set email alerts
|

Theorem-proving anonymity of infinite-state systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2007
2007
2016
2016

Publication Types

Select...
4
2

Relationship

3
3

Authors

Journals

citations
Cited by 14 publications
(22 citation statements)
references
References 5 publications
0
22
0
Order By: Relevance
“…We have extended the simulation-based proof method [13,12] for non-deterministic anonymity to apply to the notion of probabilistic anonymity defined in [4]. For the move we have exploited a generic theory of traces and simulations [9,10] in which the difference between non-determinism and probability is just a different choice of a parameter.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…We have extended the simulation-based proof method [13,12] for non-deterministic anonymity to apply to the notion of probabilistic anonymity defined in [4]. For the move we have exploited a generic theory of traces and simulations [9,10] in which the difference between non-determinism and probability is just a different choice of a parameter.…”
Section: Discussionmentioning
confidence: 99%
“…Hence our adversary has less observation power than one in [1] for example where security notions are bisimulation-based. A justification for having such a weaker adversary is found in [13].…”
Section: Definition 39 (Conditional Anonimity [8]mentioning
confidence: 99%
See 2 more Smart Citations
“…The formal method has already been applied to analyze distributed systems and it can also be used to study the anonymous communication systems, such as [12] and [14], the method used in [14] is Mull Krakow chain and the method in [12] considers theoremproving.…”
Section: Anonymity Proofmentioning
confidence: 99%