Sciweavers

1833 search results - page 27 / 367
» Mechanized Verification with Sharing
Sort
View
SP
2008
IEEE
132views Security Privacy» more  SP 2008»
13 years 9 months ago
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
e an abstraction of zero-knowledge protocols that is le to a fully mechanized analysis. The abstraction is formalized within the applied pi-calculus using a novel equational theor...
Michael Backes, Matteo Maffei, Dominique Unruh
PPAM
2005
Springer
14 years 4 months ago
Checkpointing Speculative Distributed Shared Memory
This paper describes a checkpointing mechanism destined for Distributed Shared Memory (DSM) systems with speculative prefetching. Speculation is a general technique involving predi...
Arkadiusz Danilecki, Anna Kobusinska, Michal Szych...
ICC
2009
IEEE
118views Communications» more  ICC 2009»
14 years 5 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
CORR
2010
Springer
59views Education» more  CORR 2010»
13 years 9 months ago
Refinement and Verification of Real-Time Systems
This paper discusses highly general mechanisms for specifying the refinement of a real-time system as a collection of lower level parallel components that preserve the timing and ...
Paul Z. Kolano, Carlo A. Furia, Richard A. Kemmere...
POPL
1993
ACM
14 years 3 months ago
Quasi-Static Scoping: Sharing Variable Bindings Across Multiple Lexical Scopes
Static scoping embodies a strong encapsulation mechanism for hiding the details of program units. Yet, it does not allow the sharing of variable bindings locations across indepe...
Shinn-Der Lee, Daniel P. Friedman