Sciweavers

4047 search results - page 669 / 810
» Algebraic Model Checking
Sort
View
LICS
2003
IEEE
15 years 10 months ago
Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or
We present decidability results for the verification of cryptographic protocols in the presence of equational theories corresponding to xor and Abelian groups. Since the perfect ...
Hubert Comon-Lundh, Vitaly Shmatikov
DOLAP
2003
ACM
15 years 10 months ago
Implementing operations to navigate semantic star schemas
In the last years, lots of work have been devoted to multidimensional modeling, star shape schemas and OLAP operations. However, “drill-across” has not captured as much attent...
Alberto Abelló, José Samos, Fè...
INDOCRYPT
2003
Springer
15 years 10 months ago
On Multiplicative Linear Secret Sharing Schemes
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC), based on the underlying linear secret sharing scheme. Our goal is to study the ...
Ventzislav Nikov, Svetla Nikova, Bart Preneel
LICS
2002
IEEE
15 years 10 months ago
The Metric Analogue of Weak Bisimulation for Probabilistic Processes
We observe that equivalence is not a robust concept in the presence of numerical information - such as probabilities - in the model. We develop a metric analogue of weak bisimulat...
Josee Desharnais, Radha Jagadeesan, Vineet Gupta, ...
CONCUR
2001
Springer
15 years 9 months ago
Symbolic Computation of Maximal Probabilistic Reachability
We study the maximal reachability probability problem for infinite-state systems featuring both nondeterministic and probabilistic choice. The problem involves the computation of ...
Marta Z. Kwiatkowska, Gethin Norman, Jeremy Sprost...