Sciweavers

227 search results - page 23 / 46
» A Spatial-Epistemic Logic for Reasoning about Security Proto...
Sort
View
ESORICS
2008
Springer
14 years 11 months ago
State Space Reduction in the Maude-NRL Protocol Analyzer
The Maude-NRL Protocol Analyzer (Maude-NPA) is a tool and inference system for reasoning about the security of cryptographic protocols in which the cryptosystems satisfy different ...
Santiago Escobar, Catherine Meadows, José M...
FMSD
2002
81views more  FMSD 2002»
14 years 9 months ago
A Notation and Logic for Mobile Computing
Abstract. We de ne a concurrent mobile system as one where independently executing components may migrate through some space during the course of the computation, and where the pat...
Gruia-Catalin Roman, Peter J. McCann
POPL
2011
ACM
14 years 20 days ago
Static analysis of interrupt-driven programs synchronized via the priority ceiling protocol
We consider programs for embedded real-time systems which use priority-driven preemptive scheduling with task priorities adjusted dynamically according to the immediate ceiling pr...
Martin D. Schwarz, Helmut Seidl, Vesal Vojdani, Pe...
DEXAW
2003
IEEE
108views Database» more  DEXAW 2003»
15 years 3 months ago
Electronic Voting Systems: Security Implications of the Administrative Workflow
With the rapid growth of the Internet, online voting appears to be a reasonable alternative to conventional elections and other opinion expressing processes. Current research focu...
Costas Lambrinoudakis, Spyros Kokolakis, Maria Kar...
TGC
2007
Springer
15 years 3 months ago
Computational Soundness of Equational Theories (Tutorial)
Abstract. We study the link between formal and cryptographic models for security protocols in the presence of passive and adaptive adversaries. We first describe the seminal resul...
Steve Kremer