Sciweavers

858 search results - page 76 / 172
» Formal Verification of Digital Systems
Sort
View
AVBPA
2003
Springer
164views Biometrics» more  AVBPA 2003»
15 years 4 months ago
Personal Verification Using Palmprint and Hand Geometry Biometric
A new approach for the personal identification using hand images is presented. This paper attempts to improve the performance of palmprint-based verification system by integrating ...
Ajay Kumar, David C. M. Wong, Helen C. Shen, Anil ...
FMSD
2006
103views more  FMSD 2006»
14 years 11 months ago
Cones and foci: A mechanical framework for protocol verification
We define a cones and foci proof method, which rephrases the question whether two system specifications are branching bisimilar in terms of proof obligations on relations between ...
Wan Fokkink, Jun Pang, Jaco van de Pol
SIGSOFT
2007
ACM
15 years 11 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
SACMAT
2009
ACM
15 years 5 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
ITC
2003
IEEE
113views Hardware» more  ITC 2003»
15 years 4 months ago
Fault Injection for Verifying Testability at the VHDL Level
This paper presents a technique to improve verification at the VHDL level of digital circuits by means of a specially designed fault injection block. The injection technique allow...
S. R. Seward, Parag K. Lala