#### Filter Results:

- Full text PDF available (12)

#### Publication Year

1982

2006

- This year (0)
- Last 5 years (0)
- Last 10 years (0)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Method

#### Organism

Learn More

- John C. Mitchell, Ajith Ramanathan, Andre Scedrov, Vanessa Teague
- Theor. Comput. Sci.
- 2006

We prove properties of a process calculus that is designed for analysing security protocols. Our long-term goal is to develop a form of protocol analysis, consistent with standard cryptographic… (More)

A cryptographic primitive or a security mechanism can be specified in a variety of ways, such as a condition involving a game against an attacker, construction of an ideal functionality, or a list of… (More)

We prove properties of a process calculus that is designed for analyzing security protocols. Our long-term goal is to develop a form of protocol analysis, consistent with standard cryptographic… (More)

- John C. Mitchell, Ajith Ramanathan, Andre Scedrov, Vanessa Teague
- Electr. Notes Theor. Comput. Sci.
- 2001

We describe properties of a process calculus that has been developed for the purpose of analyzing security protocols. The process calculus is a restricted form of π-calculus, with bounded replication… (More)

- Ajith Ramanathan, John C. Mitchell, Andre Scedrov, Vanessa Teague
- FoSSaCS
- 2004

Using a probabilistic polynomial-time process calculus designed for specifying security properties as observational equivalences, we develop a form of bisimulation that justifies an equational proof… (More)

- Ralf Küsters, Anupam Datta, John C. Mitchell, Ajith Ramanathan
- Journal of Cryptology
- 2005

Several compositional forms of simulation-based security have been proposed in the literature, including Universal Composability, Black-Box Simulatability, and variants thereof. These relations… (More)

- Ajith Ramanathan
- Indian journal of psychiatry
- 1986

The hallucination of spoken voice is a complex phenomenon. But we mention more about what is spoken in what person than about who speaks. The speaker cannot be neglected just because he has not been… (More)

A cryptographic primitive or a security mechanism can be specified in a variety of ways, such as a condition involving a game against an attacker, construction of an ideal functionality, or a list of… (More)

- Ajith Ramanathan
- Indian journal of psychiatry
- 1986

An intelligent schizophrenic whose fictitious name was Jonathan Lang hallucinated for more than 8 years. His coping behaviour included analysing the aspects of hallucinations, analysing the… (More)