Sciweavers

2488 search results - page 235 / 498
» An improvement in formal verification
Sort
View
EUROCRYPT
2000
Springer
15 years 5 months ago
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
Abstract. When designing password-authenticated key exchange protocols (as opposed to key exchange protocols authenticated using cryptographically secure keys), one must not allow ...
Victor Boyko, Philip D. MacKenzie, Sarvar Patel
APN
2008
Springer
15 years 3 months ago
Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
Abstract. In this paper, we introduce a framework composed of a syntax and its compositional Petri net semantics, for the specification and verification of properties (like authent...
Roland Bouroulet, Raymond R. Devillers, Hanna Klau...
FORMATS
2008
Springer
15 years 2 months ago
Comparing the Expressiveness of Timed Automata and Timed Extensions of Petri Nets
Time dependant models have been intensively studied for many reasons, among others because of their applications in software verification and due to the development of embedded pla...
Jirí Srba
ENTCS
2006
153views more  ENTCS 2006»
15 years 1 months ago
Towards Model Transformation in Generated Eclipse Editor Plug-Ins
With the growing importance of model-driven development, the ability of transforming models into well-defined semantic domains becomes a key to automated code generation or verifi...
Karsten Ehrig, Claudia Ermel, Stefan Hänsgen
IJSI
2008
126views more  IJSI 2008»
15 years 1 months ago
Modelling Route Instructions for Robust Human-Robot Interaction on Navigation Tasks
In this paper, we demonstrate the use of qualitative spatial modelling as the foundation for the conceptual representation of route instructions, to enable robust humanrobot intera...
Hui Shi, Bernd Krieg-Brückner