Sciweavers

372 search results - page 43 / 75
» Model Checking Commitment Protocols
Sort
View
ASIACRYPT
2008
Springer
13 years 10 months ago
Universally Composable Adaptive Oblivious Transfer
In an oblivious transfer (OT) protocol, a Sender with messages M1, . . . , MN and a Receiver with indices 1, . . . , k [1, N] interact in such a way that at the end the Receiver ...
Matthew Green, Susan Hohenberger
EUROMICRO
2007
IEEE
14 years 3 months ago
Partial Verification of Software Components: Heuristics for Environment Construction
Code model checking of software components suffers from the well-known problem of state explosion when applied to highly parallel components, despite the fact that a single compon...
Pavel Parizek, Frantisek Plasil
DATE
2004
IEEE
184views Hardware» more  DATE 2004»
14 years 11 days ago
Automatic Verification of Safety and Liveness for XScale-Like Processor Models Using WEB Refinements
We show how to automatically verify that complex XScale-like pipelined machine models satisfy the same safety and liveness properties as their corresponding instruction set archit...
Panagiotis Manolios, Sudarshan K. Srinivasan
HPN
1992
13 years 9 months ago
Client-Network Interactions in Quality of Service Communication Environments
Multimediacommunication,with its strong requirementsfor high speed, assured quality, and reliable networking, is stimulating a great research e ort towards the development of real...
Domenico Ferrari, Jean Ramaekers, Giorgio Ventre
ICALP
2001
Springer
14 years 1 months ago
Symbolic Trace Analysis of Cryptographic Protocols
A cryptographic protocol can be described as a system of concurrent processes, and analysis of the traces generated by this system can be used to verify authentication and secrecy ...
Michele Boreale