Sciweavers

207 search results - page 3 / 42
» Automated Protocol Implementations Based on Activity Threads
Sort
View
TARK
2007
Springer
13 years 11 months ago
Preservation of epistemic properties in security protocol implementations
We introduce (i) a general class of security protocols with private channel as cryptographic primitive and (ii) a probabilistic epistemic logic to express properties of security pr...
Ron van der Meyden, Thomas Wilke
PTS
2000
58views Hardware» more  PTS 2000»
13 years 6 months ago
Formal Test Automation: The Conference Protocol with PHACT
We discuss a case study of automatic test generation and test execution based on formal methods. The case is the Conference Protocol, a simple, chatbox-like protocol, for which (fo...
Lex Heerink, Jan Feenstra, Jan Tretmans
TPDS
2008
90views more  TPDS 2008»
13 years 4 months ago
A Reservation-Based Extended Transaction Protocol
With the advent of the new generation of Internet-based technology, in particular Web Services, the automation of business activities that are distributed across multiple enterpri...
Wenbing Zhao, Louise E. Moser, P. M. Melliar-Smith
MICRO
2002
IEEE
122views Hardware» more  MICRO 2002»
13 years 9 months ago
Microarchitectural denial of service: insuring microarchitectural fairness
Simultaneous multithreading seeks to improve the aggregate computation bandwidth of a processor core by sharing resources such as functional units, caches, TLB and so on. To date,...
Dirk Grunwald, Soraya Ghiasi
ACSAC
2005
IEEE
13 years 10 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens