Sciweavers

2153 search results - page 70 / 431
» From Requirements Models to Formal Specifications in B
Sort
View
ATVA
2009
Springer
141views Hardware» more  ATVA 2009»
14 years 1 months ago
Formal Verification for High-Assurance Behavioral Synthesis
We present a framework for certifying hardware designs generated through behavioral synthesis, by using formal verification to certify the associated synthesis transformations. We ...
Sandip Ray, Kecheng Hao, Yan Chen, Fei Xie, Jin Ya...
ASIAN
2009
Springer
334views Algorithms» more  ASIAN 2009»
13 years 10 months ago
A Dolev-Yao Model for Zero Knowledge
In cryptographic protocols, zero knowledge proofs are employed for a principal A to communicate some non-trivial information t to B while at the same time ensuring that B cannot de...
Anguraj Baskar, Ramaswamy Ramanujam, S. P. Suresh
PKC
2009
Springer
180views Cryptology» more  PKC 2009»
14 years 9 months ago
Security of Sanitizable Signatures Revisited
Sanitizable signature schemes, as defined by Ateniese et al. (ESORICS 2005), allow a signer to partly delegate signing rights to another party, called the sanitizer. That is, the s...
Anja Lehmann, Christina Brzuska, Dominique Schr&ou...
TC
2002
13 years 8 months ago
Designing High Integrity Systems Using Aspects
: In this paper we show how design-level aspects can be used to develop high integrity systems. In our approach, a system designer must first identify the specific mechanisms requi...
Geri Georg, Robert B. France, Indrakshi Ray
ECBS
2002
IEEE
119views Hardware» more  ECBS 2002»
14 years 2 months ago
Managing Complex Temporal Requirements in Real-Time Control Systems
Design and implementation of motion control applications includes the transition from control design to real-time system implementation. To make this transition smooth, the specif...
Kristian Sandström, Christer Norström