Sciweavers

2282 search results - page 192 / 457
» Active property checking
Sort
View
127
Voted
LICS
2003
IEEE
15 years 10 months ago
An NP Decision Procedure for Protocol Insecurity with XOR
We provide a method for deciding the insecurity of cryptographic protocols in presence of the standard Dolev-Yao intruder (with a finite number of sessions) extended with so-call...
Yannick Chevalier, Ralf Küsters, Michaël...
CHARME
2003
Springer
129views Hardware» more  CHARME 2003»
15 years 10 months ago
On the Correctness of an Intrusion-Tolerant Group Communication Protocol
Intrusion-tolerance is the technique of using fault-tolerance to achieve security properties. Assuming that faults, both benign and Byzantine, are unavoidable, the main goal of Int...
Mohamed Layouni, Jozef Hooman, Sofiène Taha...
CIA
2003
Springer
15 years 10 months ago
Organisational Change: Deliberation and Modification
Abstract For an information-agent-based system to support virtual (Internet-supported) organisations, changes in environmental conditions often demand changes in organisational beh...
Catholijn M. Jonker, Martijn C. Schut, Jan Treur
APSEC
2002
IEEE
15 years 10 months ago
Symbolic Simulation of Hybrid Systems
Continuous action systems (CAS) is a formalism intended for modeling hybrid systems (systems that combine discrete control with continuous behavior), and proving properties about ...
Ralph-Johan Back, Cristina Cerschi Seceleanu, Jan ...
ICALP
2001
Springer
15 years 9 months ago
Symbolic Trace Analysis of Cryptographic Protocols
A cryptographic protocol can be described as a system of concurrent processes, and analysis of the traces generated by this system can be used to verify authentication and secrecy ...
Michele Boreale