Sciweavers

352 search results - page 36 / 71
» Extended Timed Automata and Time Petri Nets
Sort
View
ACSAC
2003
IEEE
15 years 5 months ago
Modeling of Multiple Agent based Cryptographic Key Recovery Protocol
When a receiver of a ciphertext message can not decrypt the message due to the fact that he has lost his private-key, the private-key of the receiver and session-key of the messag...
Shinyoung Lim, Sangseung Kang, Joo-Chan Sohn
EMS
2008
IEEE
15 years 3 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
APN
2005
Springer
15 years 7 months ago
Can I Execute My Scenario in Your Net?
This paper describes the verification module (the VipVerify Module) of the VipTool [4]. VipVerify allows to verify whether a given scenario is an execution of a system model, give...
Gabriel Juhás, Robert Lorenz, Jörg Des...
APN
2006
Springer
15 years 5 months ago
Can I Execute My Scenario in Your Net? VipTool Tells You!
This paper describes the verification module (the VipVerify Module) of the VipTool [4]. VipVerify allows to verify whether a given scenario is an execution of a system model, given...
Robin Bergenthum, Jörg Desel, Gabriel Juh&aac...
ATVA
2006
Springer
133views Hardware» more  ATVA 2006»
15 years 5 months ago
Branching-Time Property Preservation Between Real-Time Systems
In the past decades, many formal frameworks (e.g. timed automata and temporal logics) and techniques (e.g. model checking and theorem proving) have been proposed to model a real-ti...
Jinfeng Huang, Marc Geilen, Jeroen Voeten, Henk Co...