Sciweavers

372 search results - page 11 / 75
» Model Checking Commitment Protocols
Sort
View
EUROPAR
1998
Springer
14 years 29 days ago
Exploiting Atomic Broadcast in Replicated Databases
Database replication protocols have historically been built on top of distributed database systems, and have consequently been designed and implemented using distributed transacti...
Fernando Pedone, Rachid Guerraoui, André Sc...
PKC
2010
Springer
119views Cryptology» more  PKC 2010»
13 years 10 months ago
Efficient Set Operations in the Presence of Malicious Adversaries
We revisit the problem of constructing efficient secure two-party protocols for the problems of setintersection and set-union, focusing on the model of malicious parties. Our main...
Carmit Hazay, Kobbi Nissim
SAM
2004
151views Hardware» more  SAM 2004»
13 years 10 months ago
Checking Secrecy by Means of Partial Order Reduction
We propose a partial order reduction for model checking security protocols for the secrecy property. Based on this reduction we develop an automatic tool that can check security pr...
Cas J. F. Cremers, Sjouke Mauw
CHARME
2001
Springer
162views Hardware» more  CHARME 2001»
14 years 11 days ago
Parameterized Verification of the FLASH Cache Coherence Protocol by Compositional Model Checking
We consider the formal verification of the cache coherence protocol of the Stanford FLASH multiprocessor for N processors. The proof uses the SMV proof assistant, a proof system ba...
Kenneth L. McMillan
EUROCRYPT
2011
Springer
13 years 6 days ago
Concurrent Composition in the Bounded Quantum Storage Model
We define the BQS-UC model, a variant of the UC model, that deals with protocols in the bounded quantum storage model. We present a statistically secure commitment protocol in th...
Dominique Unruh