Sciweavers

1490 search results - page 225 / 298
» The Logic of Authentication Protocols
Sort
View
FORTE
2011
14 years 4 months ago
Analyzing BGP Instances in Maude
Analyzing Border Gateway Protocol (BGP) instances is a crucial step in the design and implementation of safe BGP systems. Today, the analysis is a manual and tedious process. Resea...
Anduo Wang, Carolyn L. Talcott, Limin Jia, Boon Th...
81
Voted
CADE
2005
Springer
16 years 28 days ago
Deduction with XOR Constraints in Security API Modelling
We introduce XOR constraints, and show how they enable a theorem prover to reason effectively about security critical subsystems which employ bitwise XOR. Our primary case study is...
Graham Steel
98
Voted
ASIAN
1998
Springer
99views Algorithms» more  ASIAN 1998»
15 years 4 months ago
Eventuality in LOTOS with a Disjunction Operator
LOTOS is a formal specification language, designed for the precise description of open distributed systems and protocols. Our purpose is to introduce the operators of logics (for e...
Yoshinao Isobe, Yutaka Sato, Kazuhito Ohmaki
90
Voted
HPCA
2009
IEEE
16 years 1 months ago
In-Network Snoop Ordering (INSO): Snoopy coherence on unordered interconnects
Realizing scalable cache coherence in the many-core era comes with a whole new set of constraints and opportunities. It is widely believed that multi-hop, unordered on-chip networ...
Niket Agarwal, Li-Shiuan Peh, Niraj K. Jha
103
Voted
FSTTCS
2003
Springer
15 years 5 months ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh