Sciweavers

576 search results - page 98 / 116
» Modeling Adversaries in a Logic for Security Protocol Analys...
Sort
View
IFIP
2004
Springer
14 years 27 days ago
Decidability of Opacity with Non-Atomic Keys
The most studied property, secrecy, is not always sufficient to prove the security of a protocol. Other properties such as anonymity, privacy or opacity could be useful. Here, we u...
Laurent Mazaré
CL
2007
Springer
13 years 7 months ago
A bulk-synchronous parallel process algebra
The CCS (Calculus of Communicating Systems) process algebra is a well-known formal model of synchronization and communication. It is used for the analysis of safety and liveness i...
Armelle Merlin, Gaétan Hains
ICIAR
2005
Springer
14 years 1 months ago
A Step Towards Practical Steganography Systems
There has been many hidden communication techniques proposed in the last few years. The focus was given to steganography to build such techniques. Utilizing stego-key(s) to hide se...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
SIGMETRICS
2008
ACM
130views Hardware» more  SIGMETRICS 2008»
13 years 7 months ago
Using probabilistic model checking in systems biology
Probabilistic model checking is a formal verification framework for systems which exhibit stochastic behaviour. It has been successfully applied to a wide range of domains, includ...
Marta Z. Kwiatkowska, Gethin Norman, David Parker
SAFECOMP
2009
Springer
14 years 2 months ago
Probabilistic Failure Propagation and Transformation Analysis
A key concern in safety engineering is understanding the overall emergent failure behaviour of a system, i.e., behaviour exhibited by the system that is outside its specification ...
Xiaocheng Ge, Richard F. Paige, John A. McDermid