Sciweavers

814 search results - page 63 / 163
» Analysis of Modular Arithmetic
Sort
View
LPAR
2005
Springer
15 years 3 months ago
Algebraic Intruder Deductions
Abstract. Many security protocols fundamentally depend on the algebraic properties of cryptographic operators. It is however difficult to handle these properties when formally anal...
David A. Basin, Sebastian Mödersheim, Luca Vi...
CAV
2003
Springer
140views Hardware» more  CAV 2003»
15 years 1 months ago
Rabbit: A Tool for BDD-Based Verification of Real-Time Systems
Thispapergivesashort overviewofa model checking tool forreal-time systems. The modeling language are timed automata extended with concepts for modular modeling. The tool provides r...
Dirk Beyer, Claus Lewerentz, Andreas Noack
JMLC
2000
Springer
15 years 1 months ago
Modularisation of Software Configuration Management
The principle of modularisation is one of the main techniques that software designers use to tame the complexity of programming. A software project, however, is complex in many oth...
Henrik Bærbak Christensen
ESORICS
2008
Springer
14 years 11 months ago
Compositional Refinement of Policies in UML - Exemplified for Access Control
The UML is the de facto standard for system specification, but offers little specialized support for the specification and analysis of policies. This paper presents Deontic STAIRS,...
Bjørnar Solhaug, Ketil Stølen
DAGSTUHL
2008
14 years 11 months ago
Transfinite Interpolation for Well-Definition in Error Analysis in Solid Modelling
An overall approach to the problem of error analysis in the context of solid modelling, analogous to the standard forward/backward error analysis of Numerical Analysis, was describ...
Neil F. Stewart, Malika Zidani