Sciweavers

4485 search results - page 45 / 897
» Equivalences on Observable Processes
Sort
View
CCS
2011
ACM
12 years 8 months ago
Trace equivalence decision: negative tests and non-determinism
We consider security properties of cryptographic protocols that can be modeled using the notion of trace equivalence. The notion of equivalence is crucial when specifying privacy-...
Vincent Cheval, Hubert Comon-Lundh, Stéphan...
ARESEC
2011
104views more  ARESEC 2011»
12 years 8 months ago
An Inductive Approach to Provable Anonymity
—We formalise in a theorem prover the notion of provable anonymity proposed by Garcia et al. Our formalization relies on inductive definitions of message distinguish ability and...
Yongjian Li, Jun Pang
EUSFLAT
2009
343views Fuzzy Logic» more  EUSFLAT 2009»
13 years 6 months ago
Towards an Interpretation of the Connectivity Analysis in the Frame of Fuzzy Equivalence Relations for Medical Diagnoses
Connectivity analysis methodology is suitable to find representative symptoms of a disease. This methodology describes connections between symptoms in particular way and then choos...
Tatiana Kiseliova
FUIN
2007
84views more  FUIN 2007»
13 years 8 months ago
Observation Based System Security
A formal model for description of passive and active timing attacks is presented, studied and compared with other security concepts. It is based on a timed process algebra and on a...
Damas P. Gruska
ICST
2009
IEEE
13 years 6 months ago
Proving Functional Equivalence of Two AES Implementations Using Bounded Model Checking
Bounded model checking--as well as symbolic equivalence checking--are highly successful techniques in the hardware domain. Recently, bit-vector bounded model checkers like CBMC ha...
Hendrik Post, Carsten Sinz