Sciweavers

24 search results - page 3 / 5
» Cryptographically-Sound Protocol-Model Abstractions
Sort
View
ENTCS
2000
112views more  ENTCS 2000»
13 years 10 months ago
Typed Multiset Rewriting Specifications of Security Protocols
The language MSR has successfully been used in the past to prove undecidability about security protocols modeled according to the Dolev-Yao abstraction. In this paper, we revise t...
Iliano Cervesato
INFOCOM
2012
IEEE
12 years 24 days ago
Toward simple criteria to establish capacity scaling laws for wireless networks
Abstract—Capacity scaling laws offer fundamental understanding on the trend of user throughput behavior when the network size increases. Since the seminal work of Gupta and Kumar...
Canming Jiang, Yi Shi, Y. Thomas Hou, Wenjing Lou,...
ERSHOV
2009
Springer
14 years 2 months ago
A Java Supercompiler and Its Application to Verification of Cache-Coherence Protocols
Abstract. The Java Supercompiler (JScp) is a specializer of Java programs based on the Turchin's supercompilation method and extended to support imperative and object-oriented...
Andrei V. Klimov
FUIN
2006
142views more  FUIN 2006»
13 years 10 months ago
Comparing BDD and SAT Based Techniques for Model Checking Chaum's Dining Cryptographers Protocol
Abstract. We analyse different versions of the Dining Cryptographers protocol by means of automatic verification via model checking. Specifically we model the protocol in terms of ...
Magdalena Kacprzak, Alessio Lomuscio, Artur Niewia...
SEFM
2007
IEEE
14 years 4 months ago
Protocol Conformance Testing a SIP Registrar: an Industrial Application of Formal Methods
Various research prototypes and a well-founded theory of model based testing (MBT) suggests the application of MBT to real-world problems. In this article we report on applying th...
Bernhard K. Aichernig, Bernhard Peischl, Martin We...