Sciweavers

176 search results - page 2 / 36
» Abstraction and Refinement in Protocol Derivation
Sort
View
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
12 years 8 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
HYBRID
2007
Springer
13 years 9 months ago
Safety Verification of an Aircraft Landing Protocol: A Refinement Approach
Abstract. In this paper, we propose a new approach for formal verification of hybrid systems. To do so, we present a new refinement proof technique, a weak refinement using step in...
Shinya Umeno, Nancy A. Lynch
ASM
2008
ASM
13 years 7 months ago
A Concept-Driven Construction of the Mondex Protocol Using Three Refinements
Abstract. The Mondex case study concerns the formal development and verification of an electronic purse protocol. Several groups have worked on its specification and mechanical ver...
Gerhard Schellhorn, Richard Banach
ECOOPW
1999
Springer
13 years 9 months ago
Deriving Object-Oriented Frameworks from Domain Knowledge
Although a considerable number of successful frameworks have been developed during the last decade, designing a high-quality framework is still a difficult task. Generally, it is ...
Mehmet Aksit
FMCO
2009
Springer
203views Formal Methods» more  FMCO 2009»
13 years 3 months ago
Applying Event-B Atomicity Decomposition to a Multi Media Protocol
Abstract. Atomicity Decomposition is a technique in the Event-B formal method, which augments Event-B refinement with additional structuring in a diagrammatic notation to support c...
Asieh Salehi Fathabadi, Michael Butler