Sciweavers

372 search results - page 31 / 75
» Model Checking Commitment Protocols
Sort
View
TYPES
2004
Springer
14 years 2 months ago
A Machine-Checked Formalization of the Random Oracle Model
Abstract. Most approaches to the formal analysis of cryptography protocols make the perfect cryptographic assumption, which entails for example that there is no way to obtain knowl...
Gilles Barthe, Sabrina Tarento
SOSE
2008
IEEE
14 years 3 months ago
Model-Checking of Web Services Choreography
Abstract Web services choreography describes the global model of service interactions among a set of participants. In order to achieve a common business goal, the protocols of inte...
Hongli Yang, Xiangpeng Zhao, Chao Cai, Zongyan Qiu
SPIN
2010
Springer
13 years 7 months ago
An Automata-Based Symbolic Approach for Verifying Programs on Relaxed Memory Models
This paper addresses the problem of verifying programs for the relaxed memory models implemented in modern processors. Specifically, it considers the TSO (Total Store Order) relax...
Alexander Linden, Pierre Wolper
SCN
2008
Springer
142views Communications» more  SCN 2008»
13 years 8 months ago
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
We present an implementation of the protocol of Lindell and Pinkas for secure two-party computation which is secure against malicious adversaries [13]. This is the first running sy...
Yehuda Lindell, Benny Pinkas, Nigel P. Smart
FMCAD
2000
Springer
14 years 8 days ago
A Theory of Consistency for Modular Synchronous Systems
We propose a model for modular synchronous systems with combinational dependencies and define consistency using this model. We then show how to derive this model from a modular spe...
Randal E. Bryant, Pankaj Chauhan, Edmund M. Clarke...