Sciweavers

1833 search results - page 23 / 367
» Mechanized Verification with Sharing
Sort
View
ESAS
2007
Springer
14 years 2 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
SP
2008
IEEE
195views Security Privacy» more  SP 2008»
14 years 5 months ago
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage
We study formal security properties of a state-of-the-art protocol for secure file sharing on untrusted storage, in the automatic protocol verifier ProVerif. As far as we know, ...
Bruno Blanchet, Avik Chaudhuri
P2P
2008
IEEE
176views Communications» more  P2P 2008»
14 years 5 months ago
Towards an Incentive Mechanism for Peer-to-Peer Multimedia Live Streaming Systems
Incentive mechanisms are essential components of peer-topeer systems for file sharing such as BitTorrent, since they enforce peers to share their resources and to participate. Re...
Thomas Silverston, Olivier Fourmaux, Jon Crowcroft
POPL
2010
ACM
14 years 8 months ago
Toward a Verified Relational Database Management System
We report on our experience implementing a lightweight, fully verified relational database management system (RDBMS). The functional specification of RDBMS behavior, RDBMS impleme...
Avraham Shinnar, Greg Morrisett, J. Gregory Malech...
HASE
2008
IEEE
14 years 5 months ago
A Grammar-Based Reverse Engineering Framework for Behavior Verification
A high assurance system requires both functional and nonfunctional correctness before the system is put into operation. To examine whether a system’s actual performance complies...
Chunying Zhao, Kang Zhang