Sciweavers

126 search results - page 15 / 26
» A Model Checking Approach to Protocol Conversion
Sort
View
ICALP
2001
Springer
14 years 1 months ago
Symbolic Trace Analysis of Cryptographic Protocols
A cryptographic protocol can be described as a system of concurrent processes, and analysis of the traces generated by this system can be used to verify authentication and secrecy ...
Michele Boreale
CSFW
2009
IEEE
14 years 22 days ago
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo ...
FORTE
1997
13 years 10 months ago
On-Line Timed Protocol Trace Analysis Based on Uncertain State Descriptions
This paper presents a new approach to the task of passive protocol tracing. The method called FollowSM for the first time meets all requirements of practical in-field use, inclu...
Marek Musial
ASPDAC
2001
ACM
126views Hardware» more  ASPDAC 2001»
14 years 13 days ago
A new partitioning scheme for improvement of image computation
Abstract-- Image computation is the core operation for optimization and formal verification of sequential systems like controllers or protocols. State exploration techniques based ...
Christoph Meinel, Christian Stangier
ICWS
2007
IEEE
13 years 10 months ago
Privacy-Aware Web Service Protocol Replaceability
Business protocols are becoming a necessary part of Web services description [4]. The work presented in [4] investigates mechanisms for analyzing the compatibility and the substit...
Nawal Guermouche, Salima Benbernou, Emmanuel Coque...