Sciweavers

741 search results - page 30 / 149
» Verification of security protocols using LOTOS-method and ap...
Sort
View
127
Voted
FORMATS
2010
Springer
15 years 1 months ago
A Framework for Verification of Software with Time and Probabilities
Abstract. Quantitative verification techniques are able to establish system properties such as "the probability of an airbag failing to deploy on demand" or "the exp...
Marta Z. Kwiatkowska, Gethin Norman, David Parker
ISCC
2003
IEEE
180views Communications» more  ISCC 2003»
15 years 9 months ago
Wireless Application Protocol Transport Layer Performance
: In this paper, simulation-based performance evaluation of the Wireless Application Protocol (WAP) Transport Lay er Protocol, which may be suitable for Combat Net Radio (CNR), is ...
Gökhan Kahraman, Semih Bilgen
ACSD
2010
IEEE
261views Hardware» more  ACSD 2010»
15 years 1 months ago
Partial Order Reduction for Branching Security Protocols
We extend the partial order reduction algorithm of Clarke et al. [CJM00] to handle branching security protocols, such as optimistic fair exchange protocols. Applications of the pro...
Wan Fokkink, Mohammad Torabi Dashti, Anton Wijs
CRYPTO
2007
Springer
105views Cryptology» more  CRYPTO 2007»
15 years 10 months ago
A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness
In this paper we identify the (P, Q)-DDH assumption, as an extreme, powerful generalization of the Decisional Diffie-Hellman (DDH) assumption: virtually all previously proposed gen...
Emmanuel Bresson, Yassine Lakhnech, Laurent Mazar&...
146
Voted
PET
2009
Springer
15 years 10 months ago
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases
: © Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases Brian Thompson, Stuart Haber, William G. Horne, Tomas Sander, Danfeng Yao HP Labor...
Brian Thompson, Stuart Haber, William G. Horne, To...