The higher-order, call-by-value applied pi-calculus

11Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We define a higher-order process calculus with algebraic operations such as encryption and decryption, and develop a bisimulation proof method for behavioral equivalence in this calculus. Such development has been notoriously difficult because of the subtle interactions among generative names, processes as data, and the algebraic operations. We handle them by carefully defining the calculus and adopting Sumii et al.'s environmental bisimulation, and thereby give (to our knowledge) the first "useful" proof method in this setting. We demonstrate the utility of our method through examples involving both higher-order processes and asymmetric cryptography. © 2009 Springer-Verlag.

Cite

CITATION STYLE

APA

Sato, N., & Sumii, E. (2009). The higher-order, call-by-value applied pi-calculus. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5904 LNCS, pp. 311–326). https://doi.org/10.1007/978-3-642-10672-9_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free