Sciweavers

6608 search results - page 174 / 1322
» On the Completeness of Model Checking
Sort
View
MFCS
2010
Springer
15 years 3 months ago
A dexptime-Complete Dolev-Yao Theory with Distributive Encryption
In the context of modelling cryptographic tools like blind signatures and homomorphic encryption, the DolevYao model is typically extended with an operator over which encryption i...
Anguraj Baskar, Ramaswamy Ramanujam, S. P. Suresh
AAAI
2011
14 years 4 months ago
Complete Information Pursuit Evasion in Polygonal Environments
Suppose an unpredictable evader is free to move around in a polygonal environment of arbitrary complexity that is under full camera surveillance. How many pursuers, each with the ...
Kyle Klein, Subhash Suri
ENTCS
2008
134views more  ENTCS 2008»
15 years 4 months ago
A Stack-Slicing Algorithm for Multi-Core Model Checking
The broad availability of multi-core chips on standard desktop PCs provides strong motivation for the development of new algorithms for logic model checkers that can take advantag...
Gerard J. Holzmann
TYPES
2004
Springer
15 years 10 months ago
A Machine-Checked Formalization of the Random Oracle Model
Abstract. Most approaches to the formal analysis of cryptography protocols make the perfect cryptographic assumption, which entails for example that there is no way to obtain knowl...
Gilles Barthe, Sabrina Tarento
FMICS
2010
Springer
15 years 5 months ago
Model Checking the FlexRay Physical Layer Protocol
Abstract. The FlexRay standard, developed by a cooperation of leading companies in the automotive industry, is a robust communication protocol for distributed components in modern ...
Michael Gerke 0002, Rüdiger Ehlers, Bernd Fin...