Sciweavers

2947 search results - page 88 / 590
» Analyzing Program Analyses
Sort
View
IFIP
2009
Springer
15 years 8 days ago
Game-Based Verification of Multi-Party Contract Signing Protocols
A multi-party contract signing (MPCS) protocol is used for a group of signers to sign a digital contract over a network. We analyse the protocols of Mukhamedov and Ryan (MR), and o...
Ying Zhang, Chenyi Zhang, Jun Pang, Sjouke Mauw
123
Voted
IFIP
2010
Springer
14 years 9 months ago
Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus
Abstract. We formally study two privacy-type properties in online auction protocols, bidding-price-secrecy and receipt-freeness. These properties are formalised as observational eq...
Naipeng Dong, Hugo L. Jonker, Jun Pang
153
Voted
SAS
2012
Springer
226views Formal Methods» more  SAS 2012»
13 years 5 months ago
A Structural Soundness Proof for Shivers's Escape Technique - A Case for Galois Connections
Abstract. Shivers’s escape technique enables one to analyse the control flow of higher-order program fragments. It is widely used, but its soundness has never been proven. In th...
Jan Midtgaard, Michael D. Adams 0001, Matthew Migh...
QSIC
2006
IEEE
15 years 8 months ago
Static Slicing for Pervasive Programs
Pervasive programs should be context-aware, which means that program functions should react according to changing environmental conditions. Slicing, as an important class of code ...
Heng Lu, W. K. Chan, T. H. Tse
ADC
2004
Springer
97views Database» more  ADC 2004»
15 years 8 months ago
Static Analysis of XSLT Programs
XML is becoming the dominant standard for representing and exchanging data on the World Wide Web. The ability to transform and present data in XML is crucial and XSLT (Extensible ...
Ce Dong, James Bailey