Sciweavers

82 search results - page 4 / 17
» Inductive Proofs of Computational Secrecy
Sort
View
BIRTHDAY
2010
Springer
13 years 10 months ago
Programming Inductive Proofs - A New Approach Based on Contextual Types
In this paper, we present an overview to programming with proofs in the reasoning framework, Beluga. Beluga supports the specification of formal systems given by axioms and inferen...
Brigitte Pientka
SP
2006
IEEE
147views Security Privacy» more  SP 2006»
14 years 3 months ago
A Computationally Sound Mechanized Prover for Security Protocols
We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the co...
Bruno Blanchet
CSL
2007
Springer
14 years 4 months ago
From Proofs to Focused Proofs: A Modular Proof of Focalization in Linear Logic
Abstract. Probably the most significant result concerning cut-free sequent calculus proofs in linear logic is the completeness of focused proofs. This completeness theorem has a n...
Dale Miller, Alexis Saurin
CORR
2008
Springer
179views Education» more  CORR 2008»
13 years 10 months ago
Induction and Co-induction in Sequent Calculus
Abstract. Proof search has been used to specify a wide range of computation systems. In order to build a framework for reasoning about such specifications, we make use of a sequent...
Alwen Tiu, Alberto Momigliano
DATE
2007
IEEE
165views Hardware» more  DATE 2007»
14 years 4 months ago
Boosting the role of inductive invariants in model checking
This paper focuses on inductive invariants in unbounded model checking to improve efficiency and scalability. First of all, it introduces optimized techniques to speedup the comp...
Gianpiero Cabodi, Sergio Nocco, Stefano Quer