Sciweavers

372 search results - page 40 / 75
» Transaction Based Modeling and Verification of Hardware Prot...
Sort
View
85
Voted
FC
2010
Springer
169views Cryptology» more  FC 2010»
15 years 1 months ago
A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing
Abstract. Starting from algebraic properties that enable guessing lowentropy secrets, we formalize guessing rules for symbolic verification. The rules are suited for both off-line ...
Bogdan Groza, Marius Minea
ATVA
2008
Springer
115views Hardware» more  ATVA 2008»
14 years 11 months ago
Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
Authentication and secrecy have been widely investigated in security protocols. They are closely related to each other and variants of definitions have been proposed, which focus o...
Guoqiang Li, Mizuhito Ogawa
ASPDAC
2006
ACM
141views Hardware» more  ASPDAC 2006»
15 years 1 months ago
Depth-driven verification of simultaneous interfaces
The verification of modern computing systems has grown to dominate the cost of system design, often with limited success as designs continue to be released with latent bugs. This t...
Ilya Wagner, Valeria Bertacco, Todd M. Austin
DATE
2003
IEEE
98views Hardware» more  DATE 2003»
15 years 3 months ago
Using Formal Techniques to Debug the AMBA System-on-Chip Bus Protocol
System-on-chip (SoC) designs use bus protocols for high performance data transfer among the Intellectual Property (IP) cores. These protocols incorporate advanced features such as...
Abhik Roychoudhury, Tulika Mitra, S. R. Karri
DATE
2008
IEEE
111views Hardware» more  DATE 2008»
15 years 4 months ago
A Formal Approach To The Protocol Converter Problem
In the absence of a single module interface standard, integration of pre-designed modules in System-on-Chip design often requires the use of protocol converters. Existing approach...
Karin Avnit, Vijay D'Silva, Arcot Sowmya, S. Rames...