Sciweavers

372 search results - page 46 / 75
» Model Checking Commitment Protocols
Sort
View
IPPS
2007
IEEE
14 years 2 months ago
Formal Analysis of Time-Dependent Cryptographic Protocols in Real-Time Maude
This paper investigates the suitability of applying the general-purpose Real-Time Maude tool to the formal specification and model checking analysis of timedependent cryptographi...
Peter Csaba Ölveczky, Martin Grimeland
CHARME
2003
Springer
129views Hardware» more  CHARME 2003»
14 years 1 months ago
On the Correctness of an Intrusion-Tolerant Group Communication Protocol
Intrusion-tolerance is the technique of using fault-tolerance to achieve security properties. Assuming that faults, both benign and Byzantine, are unavoidable, the main goal of Int...
Mohamed Layouni, Jozef Hooman, Sofiène Taha...
CSFW
2009
IEEE
14 years 3 months ago
ASPIER: An Automated Framework for Verifying Security Protocol Implementations
Abstract. We present aspier – the first framework that combines software model checking with a standard protocol security model to analyze authentication and secrecy properties ...
Sagar Chaki, Anupam Datta
FAC
2008
139views more  FAC 2008»
13 years 8 months ago
Network invariants for real-time systems
We extend the approach of model checking parameterized networks of processes by means of network invariants to the setting of real-time systems. We introduce timed transition stru...
Olga Grinchtein, Martin Leucker
JACM
2002
163views more  JACM 2002»
13 years 8 months ago
Formal verification of standards for distance vector routing protocols
We show how to use an interactive theorem prover, HOL, together with a model checker, SPIN, to prove key properties of distance vector routing protocols. We do three case studies: ...
Karthikeyan Bhargavan, Davor Obradovic, Carl A. Gu...