Sciweavers

1490 search results - page 180 / 298
» The Logic of Authentication Protocols
Sort
View
83
Voted
ATVA
2009
Springer
89views Hardware» more  ATVA 2009»
15 years 7 months ago
A Data Symmetry Reduction Technique for Temporal-epistemic Logic
We present a data symmetry reduction approach for model temporal-epistemic logic. The technique abstracts the epistemic indistinguishably relation for the knowledge operators, and ...
Mika Cohen, Mads Dam, Alessio Lomuscio, Hongyang Q...
EPIA
1997
Springer
15 years 4 months ago
Vivid Agents Arguing about Distributed Extended Logic Programs
Argumentation semantics in extended logic programming has been defined in [5,12] for a single agent which determines its believes by an internal argumentation process. In this pap...
Michael Schroeder, Iara de Almeida Móra, Jo...
121
Voted
CSFW
2004
IEEE
15 years 4 months ago
Symbolic Model Checking the Knowledge of the Dining Cryptographers
This paper describes how symbolic techniques (in particular, OBDD's) may be used to to implement an algorithm for model checking specifications in the logic of knowledge for ...
Ron van der Meyden, Kaile Su
149
Voted
SIMUTOOLS
2008
15 years 2 months ago
An accurate and extensible mobile IPv6 (xMIPV6) simulation model for OMNeT++
MIPv6 is the IPv6 based mobility management protocol and it is expected to become the mobility management protocol of choice for the Next Generation Wireless Access Networks. In o...
Faqir Zarrar Yousaf, Christian Bauer, Christian Wi...
213
Voted
POPL
2006
ACM
16 years 27 days ago
Engineering with logic: HOL specification and symbolic-evaluation testing for TCP implementations
The TCP/IP protocols and Sockets API underlie much of modern computation, but their semantics have historically been very complex and ill-defined. The real standard is the de fact...
Steve Bishop, Matthew Fairbairn, Michael Norrish, ...