A calculus of mobile processes, II
Information and Computation
A compositional approach to performance modelling
A compositional approach to performance modelling
Stochastic process algebras—between LOTOS and Markov chains
Computer Networks and ISDN Systems - Special issue: trends in formal description techniques
A calculus for cryptographic protocols
Information and Computation
Non-interleaving semantics for mobile processes
Theoretical Computer Science
A cost-based framework for analysis of denial of service in networks
Journal of Computer Security
Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Enhanced operational semantics: a tool for describing and analyzing concurrent systems
ACM Computing Surveys (CSUR)
Performance Evaluation of Mobile Processes via Abstract Machines
IEEE Transactions on Software Engineering
The Design of Rijndael
Language-based performance prediction for distributed and mobile systems
Information and Computation
A calculus for control flow analysis of security protocols
International Journal of Information Security - Special issue on security in global computing
Performance Evaluation of Security Protocols Specified in LySa
Electronic Notes in Theoretical Computer Science (ENTCS)
Your 80211 wireless network has no clothes
IEEE Wireless Communications
Transactions on Computational Science IV
On evaluating the performance of security protocols
PaCT'05 Proceedings of the 8th international conference on Parallel Computing Technologies
A stochastic model of attack process for the evaluation of security metrics
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
We use a special operational semantics which helps us in predicting quantitative measures on systems describing cryptographic protocols: We also consider a possible attacker. The transitions of the system carry enhanced labels. We assign rates to transitions by only looking at these labels. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools.