Sciweavers

4340 search results - page 3 / 868
» Formal Methods and Cryptography
Sort
View
ESORICS
2005
Springer
14 years 2 months ago
Machine-Checked Security Proofs of Cryptographic Signature Schemes
Abstract. Formal methods have been extensively applied to the certification of cryptographic protocols. However, most of these works make the perfect cryptography assumption, i.e....
Sabrina Tarento
AWIC
2003
Springer
14 years 1 months ago
Secure Intelligent Agents Based on Formal Description Techniques
This paper describes a practical solution for the incorporation of security services in agents. From a set of basic user requirements, the agents will be able to find out the best ...
L. Mengual, C. de la Puente
ASIAN
2007
Springer
126views Algorithms» more  ASIAN 2007»
14 years 2 months ago
Computational Semantics for Basic Protocol Logic - A Stochastic Approach
Abstract. This paper is concerned about relating formal and computational models of cryptography in case of active adversaries when formal security analysis is done with first ord...
Gergei Bana, Koji Hasebe, Mitsuhiro Okada
TOCL
2012
202views Formal Methods» more  TOCL 2012»
11 years 11 months ago
Reachability Problems in Piecewise FIFO Systems
Naghmeh Ghafari, Arie Gurfinkel, Nils Klarlund, Ri...
TOCL
2012
233views Formal Methods» more  TOCL 2012»
11 years 11 months ago
On the Expressive Power of Multiple Heads in CHR
Cinzia Di Giusto, Maurizio Gabbrielli, Maria Chiar...