Sciweavers

1833 search results - page 68 / 367
» Mechanized Verification with Sharing
Sort
View
89
Voted
ICSE
2003
IEEE-ACM
16 years 24 days ago
Cadena: An Integrated Development, Analysis, and Verification Environment for Component-based Systems
The use of component models such as Enterprise Java Beans and the CORBA Component Model (CCM) in application development is expanding rapidly. Even in real-time safety/mission-cri...
John Hatcliff, Xianghua Deng, Matthew B. Dwyer, Ge...
96
Voted
CEAS
2007
Springer
15 years 6 months ago
DomainKeys Identified Mail (DKIM): Using Digital Signatures for Domain Verification
Email protocols were designed to be flexible and forgiving, designed in a day when Internet usage was a cooperative thing. A side effect of that is that they were not designed to ...
Barry Leiba, Jim Fenton
ASWEC
2006
IEEE
15 years 6 months ago
Formal Verification of the IEEE 802.11i WLAN Security Protocol
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security pr...
Elankayer Sithirasenan, Saad Zafar, Vallipuram Mut...
124
Voted
CSFW
2009
IEEE
15 years 4 months ago
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo ...
121
Voted
DALT
2004
Springer
15 years 4 months ago
Modeling and Verification of Distributed Autonomous Agents Using Logic Programming
Systems of autonomous agents providing automated services over the Web are fast becoming a reality. Often these agent systems are constructed using procedural architectures that pr...
L. Robert Pokorny, C. R. Ramakrishnan