Applied pi calculus

Mark D. Ryan & Ben Smyth (2011) Applied pi calculus. Chapter in Véronique Cortier & Steve Kremer (editors) Formal Models and Techniques for Analyzing Security Protocols, IOS Press.
Applied pi calculus

Download

Abstract

The applied pi calculus is a language for modelling security protocols. It is an extension of the pi calculus, a language for studying concurrency and process interaction. This chapter presents the applied pi calculus in a tutorial style. It describes reachability, correspondence, and observational equivalence properties, with examples showing how to model secrecy, authentication, and privacy aspects of protocols.

Bibtex Entry

@incollection{2011-Applied-pi-calculus,
	author = "Mark D. Ryan and Ben Smyth",
	title = "{Applied pi calculus}",
	year = "2011",
	booktitle = "Formal Models and Techniques for Analyzing Security Protocols",
	editor = "V\'eronique Cortier and Steve Kremer",
	publisher = "IOS Press",
	chapter = "6",
	doi = "10.3233/978-1-60750-714-7-112",
}