Sciweavers

1833 search results - page 27 / 367
» Mechanized Verification with Sharing
Sort
View
SP
2008
IEEE
132views Security Privacy» more  SP 2008»
14 years 11 months ago
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
e an abstraction of zero-knowledge protocols that is le to a fully mechanized analysis. The abstraction is formalized within the applied pi-calculus using a novel equational theor...
Michael Backes, Matteo Maffei, Dominique Unruh
PPAM
2005
Springer
15 years 6 months ago
Checkpointing Speculative Distributed Shared Memory
This paper describes a checkpointing mechanism destined for Distributed Shared Memory (DSM) systems with speculative prefetching. Speculation is a general technique involving predi...
Arkadiusz Danilecki, Anna Kobusinska, Michal Szych...
ICC
2009
IEEE
118views Communications» more  ICC 2009»
15 years 7 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
105
Voted
CORR
2010
Springer
59views Education» more  CORR 2010»
14 years 11 months ago
Refinement and Verification of Real-Time Systems
This paper discusses highly general mechanisms for specifying the refinement of a real-time system as a collection of lower level parallel components that preserve the timing and ...
Paul Z. Kolano, Carlo A. Furia, Richard A. Kemmere...
POPL
1993
ACM
15 years 5 months ago
Quasi-Static Scoping: Sharing Variable Bindings Across Multiple Lexical Scopes
Static scoping embodies a strong encapsulation mechanism for hiding the details of program units. Yet, it does not allow the sharing of variable bindings locations across indepe...
Shinn-Der Lee, Daniel P. Friedman