Sciweavers

1268 search results - page 64 / 254
» One Logic to Use Them All
Sort
View
IACR
2011
207views more  IACR 2011»
12 years 9 months ago
Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Tw
Abstract—In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart ...
Swapnoneel Roy, Amlan K. Das, Yu Li
CORR
2010
Springer
208views Education» more  CORR 2010»
13 years 10 months ago
Bounded Model Checking of Multi-threaded Software using SMT solvers
The transition from single-core to multi-core processors has made multi-threaded software an important subject in computer aided verification. Here, we describe and evaluate an ex...
Lucas Cordeiro, Bernd Fischer 0002
FUZZIEEE
2007
IEEE
14 years 4 months ago
Social Network and One-sided Fuzzy Concept Lattices
— In this paper we present information about our experiment with a social network of students from one school class. Each pupil has characterized his/her relationships to all sch...
Stanislav Krajci, Jana Krajciova
TCS
2008
13 years 9 months ago
Sound and complete computational interpretation of symbolic hashes in the standard model
This paper provides one more step towards bridging the gap between the formal and computational approaches to the verification of cryptographic protocols. We extend the well-known ...
Flavio D. Garcia, Peter van Rossum
DATE
2004
IEEE
184views Hardware» more  DATE 2004»
14 years 1 months ago
Automatic Verification of Safety and Liveness for XScale-Like Processor Models Using WEB Refinements
We show how to automatically verify that complex XScale-like pipelined machine models satisfy the same safety and liveness properties as their corresponding instruction set archit...
Panagiotis Manolios, Sudarshan K. Srinivasan