Fault and adversary tolerance have become not only desirable but required properties of software systems because mission-critical systems are commonly distributed on large network...
The paper presents an approach to support run-time verification of software systems that combines two existing tools, Prospec and Java-MaC, into a single framework. Prospec can be...
Oscar Mondragon, Ann Q. Gates, Humberto Mendoza, O...
Rijndael is the new Advanced Encryption Standard designed by V. Rijmen and J. Daemen and chosen as AES by the NIST in October 2000. Surprisingly, the number of cryptanalyses agains...
The main focus of this paper is the problem of ensuring safety properties such as timeliness in safety critical systems. We introduce the OASIS model and its associated techniques ...
Vincent David, Jean Delcoigne, Evelyne Leret, Alai...
—Alice and Bob notation is a popular way to describe security protocols: it is intuitive, succinct, and yet expressive. Several formal protocol specification languages are based...