Sciweavers

8555 search results - page 1651 / 1711
» Property Based Coordination
Sort
View
AMAST
2008
Springer
13 years 11 months ago
A Formal Analysis of Complex Type Flaw Attacks on Security Protocols
A simple type confusion attack occurs in a security protocol, when a principal interprets data of one type as data of another. These attacks can be successfully prevented by \taggi...
Han Gao, Chiara Bodei, Pierpaolo Degano
ASMTA
2008
Springer
167views Mathematics» more  ASMTA 2008»
13 years 11 months ago
Perfect Simulation of Stochastic Automata Networks
The solution of continuous and discrete-time Markovian models is still challenging mainly when we model large complex systems, for example, to obtain performance indexes of paralle...
Paulo Fernandes, Jean-Marc Vincent, Thais Webber
ICSE
2010
IEEE-ACM
13 years 11 months ago
An exploratory study of fault-proneness in evolving aspect-oriented programs
This paper presents the results of an exploratory study on the fault-proneness of aspect-oriented programs. We analysed the faults collected from three evolving aspect-oriented sy...
Fabiano Cutigi Ferrari, Rachel Burrows, Otá...
ICSE
2010
IEEE-ACM
13 years 11 months ago
SMT-based bounded model checking for multi-threaded software in embedded systems
The transition from single-core to multi-core processors has made multi-threaded software an important subject over the last years in computer-aided verification. Model checkers ...
Lucas Cordeiro
CCS
2008
ACM
13 years 11 months ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun
« Prev « First page 1651 / 1711 Last » Next »