Performance Evaluation of Security Protocols Specified in LySa

Chiara Bodei, Michele Curti, Pierpaolo Degano, Mikael Buchholtz, Flemming Nielson, Hanne Riis Nielson, Corrado Priami

    Research output: Contribution to journalJournal articleResearchpeer-review

    Abstract

    We use a special operational semantics which drives us in inferring quantitative measures on system describing cryptographic protocols. The transitions of the system carry enhanced labels. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools.
    Original languageEnglish
    JournalElectronic Notes in Theoretical Computer Science
    Volume112
    Pages (from-to)167-189
    ISSN1571-0661
    DOIs
    Publication statusPublished - 2005

    Fingerprint Dive into the research topics of 'Performance Evaluation of Security Protocols Specified in LySa'. Together they form a unique fingerprint.

    Cite this