Sciweavers

5255 search results - page 361 / 1051
» Formal Methods for Privacy
Sort
View
ESORICS
2012
Springer
13 years 7 months ago
Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal
We show that it is possible to achieve perfect forward secrecy in two-message key exchange (KE) protocols that satisfy even stronger security properties than provided by the extend...
Cas J. F. Cremers, Michele Feltz
FM
2009
Springer
95views Formal Methods» more  FM 2009»
15 years 11 months ago
It's Doomed; We Can Prove It
Abstract. Programming errors found early are the cheapest. Tools applying to the early stage of code development exist but either they suffer from false positives (“noise”) or...
Jochen Hoenicke, K. Rustan M. Leino, Andreas Podel...
IFM
2009
Springer
15 years 11 months ago
Verifying UML/OCL Operation Contracts
In current model-driven development approaches, software models are the primary artifacts of the development process. Therefore, assessment of their correctness is a key issue to e...
Jordi Cabot, Robert Clarisó, Daniel Riera
137
Voted
TFM
2004
Springer
118views Formal Methods» more  TFM 2004»
15 years 10 months ago
A Beginner's Course on Reasoning About Imperative Programs
Formal Methods teaching at undergraduate level has been going on at Manchester for a good number of years.We have introduced various courses based on different approaches.We have e...
Kung-Kiu Lau
ICECCS
2007
IEEE
115views Hardware» more  ICECCS 2007»
15 years 8 months ago
On-the-fly model checking for C programs with extended CADP in FMICS-jETI
A current trend in the software engineering community is to integrate different tools in a friendly and powerful development environment for use by final users. This is also the c...
María-del-Mar Gallardo, Pedro Merino, Chris...