Sciweavers

2108 search results - page 134 / 422
» An Operational Semantics for Stateflow
Sort
View
ICITA
2005
IEEE
15 years 10 months ago
Uncovering Attacks on Security Protocols
Security protocols are indispensable in secure communication. We give an operational semantics of security protocols in terms of a Prolog-like language. With this semantics, we ca...
Wuu Yang
LPNMR
2004
Springer
15 years 10 months ago
Logic Programs With Monotone Cardinality Atoms
We investigate mca-programs, that is, logic programs with clauses built of monotone cardinality atoms of the form kX , where k is a non-negative integer and X is a finite set of ...
V. Wiktor Marek, Ilkka Niemelä, Miroslaw Trus...
145
Voted
TYPES
2004
Springer
15 years 10 months ago
Tactic-Based Optimized Compilation of Functional Programs
Abstract Within a framework of correct code-generation from HOLspecifications, we present a particular instance concerned with the optimized compilation of a lazy language (called...
Thomas Meyer, Burkhart Wolff
ICALP
2001
Springer
15 years 9 months ago
Symbolic Trace Analysis of Cryptographic Protocols
A cryptographic protocol can be described as a system of concurrent processes, and analysis of the traces generated by this system can be used to verify authentication and secrecy ...
Michele Boreale
PACT
2001
Springer
15 years 9 months ago
Static Analysis for Secrecy and Non-interference in Networks of Processes
We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptography” of the spi-calculus by taking time into account. This involves defining an oper...
Chiara Bodei, Pierpaolo Degano, Flemming Nielson, ...