Sciweavers

4036 search results - page 127 / 808
» Formal Methods
Sort
View
JOC
2007
129views more  JOC 2007»
15 years 4 months ago
Formal Proofs for the Security of Signcryption
Signcryption is a public key or asymmetric cryptographic method that provides simultaneously both message confidentiality and unforgeability at a lower computational and communica...
Joonsang Baek, Ron Steinfeld, Yuliang Zheng
121
Voted
JUCS
2007
108views more  JUCS 2007»
15 years 4 months ago
Integrating Module Checking and Deduction in a Formal Proof for the Perlman Spanning Tree Protocol (STP)
: In the IEEE 802.1D standard for the Media Access Control layer (MAC layer) bridges, there is an STP (Spanning Tree Protocol) definition, based on the algorithm that was proposed...
Hossein Hojjat, Hootan Nakhost, Marjan Sirjani
RE
2002
Springer
15 years 4 months ago
On the Use of Visualization in Formal Requirements Specification
A limiting factor in the industrial acceptance of formal specifications is their readability, particularly for large, complex engineering systems. We hypothesize that multiple vis...
Nicolas Dulac, Thomas Viguier, Nancy G. Leveson, M...
143
Voted
VMCAI
2005
Springer
15 years 10 months ago
An Overview of Semantics for the Validation of Numerical Programs
Interval computations, stochastic arithmetic, automatic differentiation, etc.: much work is currently done to estimate and to improve the numerical accuracy of programs but few c...
Matthieu Martel
FORTE
1994
15 years 6 months ago
An improvement in formal verification
Critical safety and liveness properties of a concurrent system can often be proven with the help of a reachability analysis of a finite state model. This type of analysis is usual...
Gerard J. Holzmann, Doron Peled