Sciweavers

2024 search results - page 68 / 405
» A Formal Model of Multi-agent Computations
Sort
View
SP
2009
IEEE
114views Security Privacy» more  SP 2009»
15 years 5 months ago
Formally Certifying the Security of Digital Signature Schemes
We present two machine-checked proofs of the existential unforgeability under adaptive chosen-message attacks of the Full Domain Hash signature scheme. These proofs formalize the ...
Santiago Zanella Béguelin, Gilles Barthe, B...
FSEN
2007
Springer
15 years 5 months ago
Formalizing Compatibility and Substitutability in Communication Protocols Using I/O-Constraint Automata
Abstract. A communication protocol consists of a sequence of messages used by peer entities to communicate. Each entity in a network is equipped by at least one protocol stack. Due...
Mahdi Niamanesh, Rasool Jalili
ISOLA
2004
Springer
15 years 4 months ago
A Formal Analysis of Bluetooth Device Discovery
Abstract. This paper presents a formal analysis of the device discovery phase of the Bluetooth wireless communication protocol. The performance of this process is the result of a c...
Marie Duflot, Marta Z. Kwiatkowska, Gethin Norman,...
ECAI
2006
Springer
15 years 2 months ago
Bridging the Gap Between Informal and Formal Guideline Representations
Abstract. Clinical guidelines are important means to improve quality of health care while limiting cost and supporting the medical staff. They are written as free text with tables ...
Andreas Seyfang, Silvia Miksch, Mar Marcos, Joland...
DAC
2009
ACM
15 years 6 months ago
Beyond verification: leveraging formal for debugging
The latest advancements in the commercial formal model checkers have enabled the integration of formal property verification with the conventional testbench based methods in the o...
Rajeev K. Ranjan, Claudionor Coelho, Sebastian Ska...