2006
DOI: 10.1016/j.entcs.2006.07.009
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Quantitative Analysis of Security Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 33 publications
0
4
0
Order By: Relevance
“…Classical techniques, like numerical analysis and performance evaluation, received attention from time to time. During this period, 72 papers were published, collecting 924 citations, CiteScore equal to 12.83 and h-index equal to 15 1 .…”
Section: Trendsmentioning
confidence: 99%
See 1 more Smart Citation
“…Classical techniques, like numerical analysis and performance evaluation, received attention from time to time. During this period, 72 papers were published, collecting 924 citations, CiteScore equal to 12.83 and h-index equal to 15 1 .…”
Section: Trendsmentioning
confidence: 99%
“…Other interesting extensions of model checking are concerned with both analysis and modeling issues. For instance, in the former case it is worth mentioning the analysis of infinite-state models (see, e.g., the case of CTMCs and CSL [120], and the local abstraction refinement approach developed for MDPs and reachability properties, and even implemented in PRISM [64]) and of distributed probabilistic input/output automata [75], while in the latter case, some developments emerged in the last decade are given by the analysis of security [1], mobility [53], and of temporal and epistemic properties of quantum systems, the automated verification of which is proposed in the setting of the symbolic model checker MCMAS [21].…”
Section: Analysis Techniques and Tools: Program Analysis Model Checki...mentioning
confidence: 99%
“…A number of approaches, e.g. [1,3,4,5,6,9,10,13], have been recently presented to perform formal protocol analysis in the presence of an intruder who can perform off-line guessing.…”
Section: Introductionmentioning
confidence: 99%
“…At IST-UTL, within the context of the QuantLog project described in Section 3, some aspects of the non experimental issues above are being addressed, namely: properties of entanglement in solid state systems [31]; particle statistics in quantum information [61,60]; quantum walks and their comparison with random walks [62]; quantum algorithms for searching [49] and in logic; quantum automata and their minimization and interconnection; quantum transition systems for model checking of quantum systems [7]; quantum logic [ [6]; and quantum attacks to classical cryptosystems.…”
Section: Discussionmentioning
confidence: 99%