Copyright Information
The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of
scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other
copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying
this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without
the explicit permission of the copyright holder.
show main publications
Handling exp, * (and Timestamps) in Protocol Analysis @INPROCEEDINGS{zunino-degano:fossacs:2006, title = {{Handling exp, * (and Timestamps) in Protocol Analysis}}, author = {{Roberto} {Zunino} and {Pierpaolo} {Degano}}, booktitle = {Proceedings of FoSSaCS 2006, 9th International Conference on Foundations of Software Science and Computation Structures}, editor = {L. Aceto and A. Ingolfsdottir}, pages = {413--427}, abstract = {We present a static analysis technique for the verification of cryptographic protocols, specified in a process calculus. Rather than assuming a specific, fixed set of cryptographic primitives, we only require them to be specified through a term rewriting system, with no restrictions. Examples are provided to support our analysis, including exponentiation (Diffie-Hellman) and timestamps (Kerberos).}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {3921}, year = {2006}, partner = {PISA}, status = {private}, task = {T3.1, T3.3, T3.4}, }
|