Abstract
We use a special operational semantics which drives us in inferring quantitative measures on system describing cryptographic protocols. The transitions of the system carry enhanced labels. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools.
| Original language | English |
|---|---|
| Journal | Electronic Notes in Theoretical Computer Science |
| Volume | 112 |
| Pages (from-to) | 167-189 |
| ISSN | 1571-0661 |
| DOIs | |
| Publication status | Published - 2005 |
Fingerprint
Dive into the research topics of 'Performance Evaluation of Security Protocols Specified in LySa'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver