Sciweavers

39 search results - page 5 / 8
» Formal Analysis of Key Integrity in PKCS
Sort
View
JALC
2006
87views more  JALC 2006»
13 years 7 months ago
A Team Automaton Scenario for the Analysis of Security Properties of Communication Protocols
Formal methods are a popular means to specify and verify security properties of a variety of communication protocols. In this article we take a step towards the use of team automa...
Maurice H. ter Beek, Gabriele Lenzini, Marinella P...
COSIT
2009
Springer
211views GIS» more  COSIT 2009»
13 years 5 months ago
The Abduction of Geographic Information Science: Transporting Spatial Reasoning to the Realm of Purpose and Design
People intuitively understand that function and purpose are critical parts of what human-configured entities are about, but these notions have proved difficult to capture formally....
Helen Couclelis
CSFW
2012
IEEE
11 years 9 months ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...
JCB
2006
185views more  JCB 2006»
13 years 7 months ago
A Probabilistic Methodology for Integrating Knowledge and Experiments on Biological Networks
Biological systems are traditionally studied by focusing on a specific subsystem, building an intuitive model for it, and refining the model using results from carefully designed ...
Irit Gat-Viks, Amos Tanay, Daniela Raijman, Ron Sh...
RTS
2006
176views more  RTS 2006»
13 years 7 months ago
Verifying distributed real-time properties of embedded systems via graph transformations and model checking
Component middleware provides dependable and efficient platforms that support key functional, and quality of service (QoS) needs of distributed real-time embedded (DRE) systems. C...
Gabor Madl, Sherif Abdelwahed, Douglas C. Schmidt