Sciweavers

480 search results - page 7 / 96
» On the verification of automotive protocols
Sort
View
ENTCS
2008
110views more  ENTCS 2008»
13 years 7 months ago
Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks
In the context of Dolev-Yao style analysis of security protocols, we consider the capability of an intruder to dynamically choose and assign names to agents. This capability has b...
Pieter Ceelen, Sjouke Mauw, Sasa Radomirovic
IANDC
2008
120views more  IANDC 2008»
13 years 7 months ago
A framework for compositional verification of security protocols
Automatic security protocol analysis is currently feasible only for small protocols. Since larger protocols quite often are composed of many small protocols, compositional analysi...
Suzana Andova, Cas J. F. Cremers, Kristian Gj&osla...
CAV
2004
Springer
154views Hardware» more  CAV 2004»
13 years 11 months ago
Automatic Verification of Sequential Consistency for Unbounded Addresses and Data Values
Sequential consistency is the archetypal correctness condition for the memory protocols of shared-memory multiprocessors. Typically, such protocols are parameterized by the number ...
Jesse D. Bingham, Anne Condon, Alan J. Hu, Shaz Qa...
MM
2004
ACM
97views Multimedia» more  MM 2004»
14 years 23 days ago
Range multicast routers for large-scale deployment of multimedia application
In this paper, we present the Range Multicast protocol and the implemented prototype. We propose to demonstrate the system at the 2004 ACM Multimedia Conference. Categories and Su...
Ning Jiang, Yao Hua Ho, Kien A. Hua
ERSHOV
2009
Springer
13 years 11 months ago
A Java Supercompiler and Its Application to Verification of Cache-Coherence Protocols
Abstract. The Java Supercompiler (JScp) is a specializer of Java programs based on the Turchin's supercompilation method and extended to support imperative and object-oriented...
Andrei V. Klimov