We study the roles of message components in authentication protocols. In particular, we investigate how a certain component contributes to the task of achieving entity authenticati...
This paper presents a method for the decomposition of HML formulae. It can be used to decide whether a process algebra term satisfies a HML formula, by checking whether subterms s...
A computationally relevant theory of lexical semantics must take into consideration both the form and the content of three different static knowledge sources -- the lexicon, the o...
In this paper, we study the observability properties of nonlinear discrete time systems. Two types of contributions are given. First, we present observability criteria in terms of...
We present an automatic analyzer for measuring information flow within software systems. In this paper, we quantify leakage in terms of information theory and incorporate this comp...