Performance Evaluation of Security Protocols Specified in LySa

Chiara Bodei, Michele Curti, Pierpaolo Degano, Mikael Buchholtz, Flemming Nielson, Hanne Riis Nielson, Corrado Priami

    Research output: Contribution to journalJournal articleResearchpeer-review


    We use a special operational semantics which drives us in inferring quantitative measures on system describing cryptographic protocols. The transitions of the system carry enhanced labels. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools.
    Original languageEnglish
    JournalElectronic Notes in Theoretical Computer Science
    Pages (from-to)167-189
    Publication statusPublished - 2005


    Dive into the research topics of 'Performance Evaluation of Security Protocols Specified in LySa'. Together they form a unique fingerprint.

    Cite this