Sciweavers

480 search results - page 36 / 96
» On the verification of automotive protocols
Sort
View
ICSE
1992
IEEE-ACM
15 years 1 months ago
A Toolbox for the Verification of LOTOS Programs
This paper presents the tools Ald
Jean-Claude Fernandez, Hubert Garavel, Laurent Mou...
IJNSEC
2010
100views more  IJNSEC 2010»
14 years 4 months ago
On the Security of Yuan et al.'s Undeniable Signature Scheme
Undeniable signatures were proposed to limit the public verification property of ordinary digital signature. In fact, the verification of such signatures cannot be obtained withou...
Wei Zhao
POPL
2010
ACM
15 years 7 months ago
Sequential Verification of Serializability
Serializability is a commonly used correctness condition in concurrent programming. When a concurrent module is serializable, certain other properties of the module can be verifie...
G. Ramalingam, Hagit Attiya, Noam Rinetzky
CCS
2010
ACM
14 years 7 months ago
Developing security protocols by refinement
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides sformation of abstract security goals into protocols that are s...
Christoph Sprenger, David A. Basin
PTS
2000
99views Hardware» more  PTS 2000»
14 years 11 months ago
Verification of Test Suites
We present a formal approach to check the correctness and to propose corrections of hand-written test suites with respect to a formal specification of the protocol implementations ...
Claude Jard, Thierry Jéron, Pierre Morel