Performance Evaluation of Security Protocols

Chiara Bodei, Mikael Buchholtz, Michele Curti, Pierpablo Degano, Flemming Nielson, Hanne Riis Nielson, Corrado Priami

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review


    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools.
    Original languageEnglish
    Title of host publicationProceedings of the 2nd Workshop on Quantitative Aspects of Programming Languages (QAPL 04)
    Publication date2005
    Publication statusPublished - 2005

    Fingerprint Dive into the research topics of 'Performance Evaluation of Security Protocols'. Together they form a unique fingerprint.

    Cite this