Abstract. Global choreographies define the rules that peers should respect in their interaction, with the aim of guaranteeing interoperability. act choreography can be seen as a p...
Matteo Baldoni, Cristina Baroglio, Alberto Martell...
— This paper describes reachability calculations for a hybrid system formalism governing UAVs interacting with another vehicle in a safety-critical situation. We examine this pro...
Jerry Ding, Jonathan Sprinkle, Shankar S. Sastry, ...
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
As cryptographic protocols execute they accumulate information such as values and keys, and evidence of properties about this information. As execution proceeds, new information b...
Abstract. Multiparty signature protocols need protection against roguekey attacks, made possible whenever an adversary can choose its public key(s) arbitrarily. For many schemes, p...