Sciweavers

4340 search results - page 95 / 868
» Formal Methods and Cryptography
Sort
View
FM
2008
Springer
184views Formal Methods» more  FM 2008»
15 years 5 months ago
Safe and Reliable Metro Platform Screen Doors Control/Command Systems
In this article we would like to present some recent applications of the B formal method to the development of safety critical system. These SIL3/SIL41 compliant systems have their...
Thierry Lecomte
TAP
2007
Springer
92views Hardware» more  TAP 2007»
15 years 10 months ago
Generating Unit Tests from Formal Proofs
We present a new automatic test generation method for JAVA CARD based on attempts at formal verification of the implementation under test (IUT). Self-contained unit tests in JUnit...
Christian Engel, Reiner Hähnle
116
Voted
FMCAD
2007
Springer
15 years 10 months ago
Formal Verification of Partial Good Self-Test Fencing Structures
— The concept of applying partial fencing to logic built-in self test (LBIST) hardware structures for the purpose of using partially good chips is well known in the chip design i...
Adrian E. Seigler, Gary A. Van Huben, Hari Mony
ACNS
2008
Springer
115views Cryptology» more  ACNS 2008»
15 years 10 months ago
Improved Conditional E-Payments
Abstract. Conditional e-cash or conditional e-payments have been introduced by Shi et al. as the means for enabling electronic payments to be based on the outcome of a certain cond...
Marina Blanton
ACNS
2007
Springer
105views Cryptology» more  ACNS 2007»
15 years 10 months ago
Analyzing an Electronic Cash Protocol Using Applied Pi Calculus
Abstract. Untraceability and unreuseability are essential security properties for electronic cash protocols. Many protocols have been proposed to meet these two properties. However...
Zhengqin Luo, Xiaojuan Cai, Jun Pang, Yuxin Deng