Sciweavers

125 search results - page 9 / 25
» Combining Theories with Shared Set Operations
Sort
View
103
Voted
CORR
2010
Springer
155views Education» more  CORR 2010»
14 years 9 months ago
A Proof Theoretic Analysis of Intruder Theories
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages under the theory of ...
Alwen Tiu, Rajeev Goré, Jeremy E. Dawson
SIGCOMM
2010
ACM
14 years 12 months ago
Theory and new primitives for safely connecting routing protocol instances
Recent studies have shown that the current primitives for connecting multiple routing protocol instances (OSPF 1, OSPF 2, EIGRP 10, etc.) are pervasively deployed in enterprise ne...
Franck Le, Geoffrey G. Xie, Hui Zhang
KR
2000
Springer
15 years 3 months ago
Reasoning with Axioms: Theory and Practice
When reasoning in description, modal or temporal logics it is often useful to consider axioms representing universal truths in the domain of discourse. Reasoning with respect to a...
Ian Horrocks, Stephan Tobies
CSCW
2006
ACM
15 years 5 months ago
AwareMedia: a shared interactive display supporting social, temporal, and spatial awareness in surgery
Several CSCW studies have shown that coordination of work in hospitals is particular challenging, and that clinicians put much effort into maintaining mutual awareness on the flo...
Jakob E. Bardram, Thomas Riisgaard Hansen, Mads S&...
112
Voted
IANDC
2008
105views more  IANDC 2008»
14 years 11 months ago
Symbolic protocol analysis for monoidal equational theories
We are interested in the design of automated procedures for analyzing the (in)security of cryptographic protocols in the Dolev-Yao model for a bounded number of sessions when we t...
Stéphanie Delaune, Pascal Lafourcade, Denis...