نتایج جستجو برای: applied pi calculus

تعداد نتایج: 666487  

2011
Bo Meng Wei Wang

Resistance of denial of service attacks is a key security requirement in voting protocols. Acquisti protocol plays an important role in development of internet voting protocols and claims its security without strong physical assumptions. In this study firstly Acquisti protocol is modeled in extended applied pi calculus, and then resistance of denial of service attacks is proved with ProVerif. T...

Journal: :Electr. Notes Theor. Comput. Sci. 2005
Alexey Gotsman Fabio Massacci Marco Pistore

We present an algorithm for the translation of security protocol specifications in the HLPSL language developed in the framework of the AVISPA project to a dialect of the applied pi calculus. This algorithm provides us with two interesting scientific contributions: at first, it provides an independent semantics of the HLPSL specification language and, second, makes it possible to verify protoco...

2014
K S ELIZABETH VARGHESE

In this paper a fractional order PI controller (FOPI) is proposed for the speed control of Permanent Magnet Synchronous Motor(PMSM). Fractional calculus is introduced into the PI controller, and proposes a robust fractional order PI controller (FOPI) for the speed control of a PMSM .PMSM drive system is a nonlinear system which is sensitive to load disturbance, parameter variation, unmodelled a...

Journal: :JCP 2012
Hui Kang Zhi Wang Shuang Zhang Fang Mei

According to the features of asynchronous interaction in systems, a new-type Pi calculus with buffers — Buffer-Pi calculus is proposed, the new labelled transition system based on buffers is introduced, the enhanced describing capability is shown to apply Buffer-Pi calculus to modeling with the concrete example of asynchronous interaction, and the new behavior equivalence relations are defined,...

Journal: :Logical Methods in Computer Science 2013
Johannes Borgström Ramunas Gutkovas Joachim Parrow Björn Victor Johannes Åman Pohjola

Applied process calculi include advanced programming constructs such as type systems, communication with pattern matching, encryption primitives, concurrent constraints, nondeterminism, process creation, and dynamic connection topologies. Several such formalisms, e.g. the applied pi calculus, are extensions of the the pi-calculus; a growing number is geared towards particular applications or co...

Journal: :J. Log. Algebr. Program. 2007
Maria Grazia Buscemi Ugo Montanari

This paper is a further step in exploring the labelled transitions and bisimulations offusion calculi. We follow a recent theory by the same authors and previously appliedto the pi-calculus for lifting calculi with structural axioms to bialgebras and, thus,we provide a compositional model of the fusion calculus with explicit fusions. Insuch a model, the bisimilarity relation ind...

Journal: :JDCTA 2010
Bo Meng Wei Huang Zimao Li Dejun Wang

Soundness and coercion resistance are the important and intricate security requirements for remote voting protocols. Several formal models of soundness and coercion-resistance have been proposed in the literatures, but these formal models are not supported by automatic tools. Recently Backes et al. propose a new formal automated model of security properties including soundness and coercionresis...

2011
Rohit Chadha

Context. Cryptographic protocols are distributed programs which use cryptographic primitives to secure communication over untrusted networks (such as the Internet). They are designed to achieve security properties such as confidentiality, authentication or anonymity. Due to the complexity of cryptographic primitives, the inherent concurrency and the untrusted nature of networks, their design ha...

2004
Lucian Wischik Philippa Gardner

The pi calculus holds the promise of compile-time checks for whether a given program will have the correct interactive behaviour. The theory behind such checks is called bisimulation. In the synchronous pi calculus, it is well-known that the various natural definitions of (strong) bisimulation yield different relations. In contrast, for the asynchronous pi calculus, they collapse to a single re...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید