Sciweavers

300 search results - page 23 / 60
» Formal Methods for Smartcard Security
Sort
View
EUROCRYPT
1995
Springer
13 years 11 months ago
Quantum Oblivious Mutual Identification
We coiisider a situation where two parties, Alice and Bob, share a common secret string arid would like to mutually check their knowledge of that string. We describe a simple and e...
Claude Crépeau, Louis Salvail
SBMF
2010
Springer
132views Formal Methods» more  SBMF 2010»
13 years 2 months ago
Midlet Navigation Graphs in JML
Abstract. In the context of the EU project Mobius on Proof Carrying Code for Java programs (midlets) on mobile devices, we present a way to express midlet navigation graphs in JML....
Wojciech Mostowski, Erik Poll
CAV
2005
Springer
196views Hardware» more  CAV 2005»
14 years 1 months ago
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications
Alessandro Armando, David A. Basin, Yohan Boichut,...
SPE
2011
13 years 2 months ago
Decomposition tool for event-B
Abstract. Two methods have been identified for Event-B model decomposition: shared variable and shared event. The purpose of this paper is to introduce the two approaches and the ...
Renato Silva, Carine Pascal, Thai Son Hoang, Micha...
FM
2005
Springer
125views Formal Methods» more  FM 2005»
14 years 1 months ago
End-to-End Integrated Security and Performance Analysis on the DEGAS Choreographer Platform
Abstract. We present a software tool platform which facilitates security and performance analysis of systems which starts and ends with UML model descriptions. A UML project is pre...
Mikael Buchholtz, Stephen Gilmore, Valentin Haenel...