Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
9655979 | Electronic Notes in Theoretical Computer Science | 2005 | 21 Pages |
Abstract
We use a special operational semantics which helps us in predicting quantitative measures on systems describing cryptographic protocols: We also consider a possible attacker. The transitions of the system carry enhanced labels. We assign rates to transitions by only looking at these labels. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools.
Related Topics
Physical Sciences and Engineering
Computer Science
Computational Theory and Mathematics
Authors
Chiara Bodei, Michele Curti, Pierpaolo Degano, Corrado Priami,