Sciweavers

227 search results - page 7 / 46
» On the Reachability Problem in Cryptographic Protocols
Sort
View
CDC
2008
IEEE
140views Control Systems» more  CDC 2008»
14 years 1 months ago
Reachability calculations for automated aerial refueling
— This paper describes reachability calculations for a hybrid system formalism governing UAVs interacting with another vehicle in a safety-critical situation. We examine this pro...
Jerry Ding, Jonathan Sprinkle, Shankar S. Sastry, ...
CCS
2001
ACM
13 years 12 months ago
The faithfulness of abstract protocol analysis: message authentication
hfulness of Abstract Protocol Analysis: Message Authentication∗ Joshua D. Guttman F. Javier Thayer Lenore D. Zuck December 18, 2002 Dolev and Yao initiated an approach to studyi...
Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuc...
CANS
2009
Springer
126views Cryptology» more  CANS 2009»
14 years 2 months ago
Ensuring Authentication of Digital Information Using Cryptographic Accumulators
In this paper, we study the broadcast authentication problem for both erasure and adversarial networks. Two important concerns for authentication protocols are the authentication ...
Christophe Tartary
ACTA
2010
104views more  ACTA 2010»
13 years 7 months ago
Reachability results for timed automata with unbounded data structures
Systems of Data Management Timed Automata (SDMTAs) are networks of communicating timed automata with structures to store messages and functions to manipulate them. We prove the dec...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo...
TACAS
1999
Springer
91views Algorithms» more  TACAS 1999»
13 years 11 months ago
Timed Diagnostics for Reachability Properties
We consider the problem of computing concrete diagnostics for timed automata and reachability properties. Concrete means containing information both about the discrete state change...
Stavros Tripakis