{"id":"https://openalex.org/W2063608931","doi":"https://doi.org/10.1137/s0097539700377864","title":"Proof Techniques for Cryptographic Processes","display_name":"Proof Techniques for Cryptographic Processes","publication_year":2001,"publication_date":"2001-01-01","ids":{"openalex":"https://openalex.org/W2063608931","doi":"https://doi.org/10.1137/s0097539700377864","mag":"2063608931"},"language":"en","primary_location":{"id":"doi:10.1137/s0097539700377864","is_oa":false,"landing_page_url":"https://doi.org/10.1137/s0097539700377864","pdf_url":null,"source":{"id":"https://openalex.org/S153560523","display_name":"SIAM Journal on Computing","issn_l":"0097-5397","issn":["0097-5397","1095-7111"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320508","host_organization_name":"Society for Industrial and Applied Mathematics","host_organization_lineage":["https://openalex.org/P4310320508"],"host_organization_lineage_names":["Society for Industrial and Applied Mathematics"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SIAM Journal on Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078624552","display_name":"Michele Boreale","orcid":"https://orcid.org/0000-0002-1972-7491"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Michele Boreale","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016732227","display_name":"Rocco De Nicola","orcid":"https://orcid.org/0000-0003-4691-7570"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rocco De Nicola","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5066761763","display_name":"Rosario Pugliese","orcid":"https://orcid.org/0000-0002-1419-1405"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rosario Pugliese","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5078624552"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":6.7018,"has_fulltext":false,"cited_by_count":88,"citation_normalized_percentile":{"value":0.97032872,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"31","issue":"3","first_page":"947","last_page":"986"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bisimulation","display_name":"Bisimulation","score":0.9093999862670898},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.8607459664344788},{"id":"https://openalex.org/keywords/soundness","display_name":"Soundness","score":0.8291023969650269},{"id":"https://openalex.org/keywords/equivalence","display_name":"Equivalence (formal languages)","score":0.701549768447876},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.6732065677642822},{"id":"https://openalex.org/keywords/process-calculus","display_name":"Process calculus","score":0.6455169320106506},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.596034824848175},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5500569939613342},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5453304052352905},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.5369431972503662},{"id":"https://openalex.org/keywords/transition-system","display_name":"Transition system","score":0.5308635830879211},{"id":"https://openalex.org/keywords/completeness","display_name":"Completeness (order theory)","score":0.5175272822380066},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4765879809856415},{"id":"https://openalex.org/keywords/calculus","display_name":"Calculus (dental)","score":0.3269086480140686},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3178699016571045},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2908032536506653},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.27184540033340454},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.25708985328674316}],"concepts":[{"id":"https://openalex.org/C135315306","wikidata":"https://www.wikidata.org/wiki/Q866364","display_name":"Bisimulation","level":2,"score":0.9093999862670898},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.8607459664344788},{"id":"https://openalex.org/C39920170","wikidata":"https://www.wikidata.org/wiki/Q693083","display_name":"Soundness","level":2,"score":0.8291023969650269},{"id":"https://openalex.org/C2780069185","wikidata":"https://www.wikidata.org/wiki/Q7977945","display_name":"Equivalence (formal languages)","level":2,"score":0.701549768447876},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.6732065677642822},{"id":"https://openalex.org/C161771561","wikidata":"https://www.wikidata.org/wiki/Q1970286","display_name":"Process calculus","level":2,"score":0.6455169320106506},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.596034824848175},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5500569939613342},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5453304052352905},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.5369431972503662},{"id":"https://openalex.org/C2779167558","wikidata":"https://www.wikidata.org/wiki/Q176468","display_name":"Transition system","level":2,"score":0.5308635830879211},{"id":"https://openalex.org/C17231256","wikidata":"https://www.wikidata.org/wiki/Q5156540","display_name":"Completeness (order theory)","level":2,"score":0.5175272822380066},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4765879809856415},{"id":"https://openalex.org/C2777686260","wikidata":"https://www.wikidata.org/wiki/Q144037","display_name":"Calculus (dental)","level":2,"score":0.3269086480140686},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3178699016571045},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2908032536506653},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.27184540033340454},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.25708985328674316},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C199343813","wikidata":"https://www.wikidata.org/wiki/Q12128","display_name":"Dentistry","level":1,"score":0.0}],"mesh":[],"locations_count":6,"locations":[{"id":"doi:10.1137/s0097539700377864","is_oa":false,"landing_page_url":"https://doi.org/10.1137/s0097539700377864","pdf_url":null,"source":{"id":"https://openalex.org/S153560523","display_name":"SIAM Journal on Computing","issn_l":"0097-5397","issn":["0097-5397","1095-7111"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320508","host_organization_name":"Society for Industrial and Applied Mathematics","host_organization_lineage":["https://openalex.org/P4310320508"],"host_organization_lineage_names":["Society for Industrial and Applied Mathematics"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SIAM Journal on Computing","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.26.75","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.26.75","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ftp://rap.dsi.unifi.it/pub/papers/BDP-spi.ps.gz","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.324.4787","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.324.4787","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://rap.dsi.unifi.it/~boreale/papers/SIAM-02.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.329.2336","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.329.2336","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://basics.sjtu.edu.cn/~yuehg/lics/proof techniques for cryptographic processes 1999.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.570.5044","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.570.5044","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://rap.dsi.unifi.it/~boreale/papers/LICS99.pdf","raw_type":"text"},{"id":"pmh:oai:flore.unifi.it:2158/218637","is_oa":false,"landing_page_url":"http://hdl.handle.net/2158/218637","pdf_url":null,"source":{"id":"https://openalex.org/S4306402033","display_name":"Florence Research (University of Florence)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45084792","host_organization_name":"University of Florence","host_organization_lineage":["https://openalex.org/I45084792"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1487583155","https://openalex.org/W1562901937","https://openalex.org/W1988856107","https://openalex.org/W2052539228","https://openalex.org/W2128995870","https://openalex.org/W2157144873"],"related_works":["https://openalex.org/W1525668581","https://openalex.org/W2951374406","https://openalex.org/W2560421581","https://openalex.org/W4232027917","https://openalex.org/W1971318400","https://openalex.org/W4300624557","https://openalex.org/W3081656401","https://openalex.org/W1608609850","https://openalex.org/W1502101334","https://openalex.org/W4230750962"],"abstract_inverted_index":{"Contextual":[0],"equivalences":[1],"for":[2,45,121],"cryptographic":[3],"process":[4],"calculi,":[5],"like":[6],"the":[7,62,64],"spi-calculus,":[8],"can":[9],"be":[10],"used":[11,77],"to":[12,78,108,116],"reason":[13],"about":[14],"correctness":[15],"of":[16,67,100,126,137,142],"protocols,":[17],"but":[18],"their":[19],"definition":[20],"suffers":[21],"from":[22],"quantification":[23,90],"over":[24,91],"all":[25],"possible":[26],"contexts.":[27,92],"Here,":[28],"we":[29,50],"focus":[30],"on":[31],"two":[32],"such":[33],"equivalences,":[34],"namely":[35],"may-testing":[36,109],"and":[37,40,69,83,98,102,110,140],"barbed":[38,111],"equivalence,":[39,112],"investigate":[41],"tractable":[42],"proof":[43,119],"methods":[44,120,128],"them.":[46],"To":[47],"this":[48],"aim,":[49],"design":[51],"an":[52],"enriched":[53],"labelled":[54],"transition":[55,73],"system,":[56],"where":[57],"transitions":[58],"are":[59,96],"constrained":[60],"by":[61],"knowledge":[63],"environment":[65],"has":[66],"names":[68],"keys.":[70],"The":[71,124],"new":[72],"system":[74],"is":[75,129],"then":[76],"define":[79],"a":[80,84,132],"trace":[81,101],"equivalence":[82,87,105,122],"weak":[85,103],"bisimulation":[86,104],"that":[88],"avoid":[89],"Our":[93],"main":[94],"results":[95],"soundness":[97],"completeness":[99],"with":[106,131],"respect":[107],"respectively.":[113],"They":[114],"lead":[115],"more":[117],"direct":[118],"checking.":[123],"use":[125],"these":[127],"illustrated":[130],"few":[133],"examples":[134],"concerning":[135],"implementation":[136],"secure":[138],"channels":[139],"verification":[141],"protocol":[143],"correctness.":[144]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
