Sciweavers

2043 search results - page 102 / 409
» Reasoning About Security Models
Sort
View
TPHOL
2003
IEEE
15 years 6 months ago
Programming a Symbolic Model Checker in a Fully Expansive Theorem Prover
Abstract. Model checking and theorem proving are two complementary approaches to formal verification. In this paper we show how binary decision diagram (BDD) based symbolic model ...
Hasan Amjad
ASWEC
2006
IEEE
15 years 6 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge
ICNC
2005
Springer
15 years 6 months ago
Modeling Belief, Capability and Promise for Cognitive Agents - A Modal Logic Approach
From the last decade, modeling of cognitive agents have drawn great attention and provide a new paradigm for addressing fundamental questions in cognitive science. In this paper, a...
Xinyu Zhao, Zuoquan Lin
94
Voted
ESOP
2003
Springer
15 years 5 months ago
Automatic Software Model Checking Using CLP
This paper proposes the use of constraint logic programming (CLP) to perform model checking of traditional, imperative programs. We present a semantics-preserving translation from ...
Cormac Flanagan
IPPS
2002
IEEE
15 years 5 months ago
An Approach to Compositional Model Checking
A natural trend in most of the engineering disciplines is the construction of systems from components. This has the potential to reduce costs and increase reliability, provided th...
Hector A. Andrade, Beverly Sanders