Sciweavers

161 search results - page 19 / 33
» fuin 2006
Sort
View
FUIN
2007
99views more  FUIN 2007»
14 years 12 months ago
Verifying Security Protocols Modelled by Networks of Automata
In this paper we show a novel method for modelling behaviours of security protocols using networks of communicating automata in order to verify them with SAT-based bounded model ch...
Miroslaw Kurkowski, Wojciech Penczek
FUIN
2007
92views more  FUIN 2007»
14 years 12 months ago
Foundations of Modal Deductive Databases
We give formulations for modal deductive databases and present a modal query language called MDatalog. We define modal relational algebras and give the seminaive evaluation algor...
Linh Anh Nguyen
FUIN
2007
100views more  FUIN 2007»
14 years 12 months ago
Interpreted Nets
The nets considered here are an extension of Petri nets in two aspects. In the semantical aspect, there is no one firing rule common to all transitions, but every transition is tr...
Ludwik Czaja
FUIN
2007
104views more  FUIN 2007»
14 years 12 months ago
Modelling and Checking Timed Authentication of Security Protocols
In this paper we offer a novel methodology for verifying correctness of (timed) security protocols. The idea consists in computing the time of a correct execution of a session and ...
Gizela Jakubowska, Wojciech Penczek
FUIN
2007
108views more  FUIN 2007»
14 years 12 months ago
Local Properties of Triangular Graphs
In the paper triangular graphs are discussed. The class of triangular graphs is of special interest as unifying basic features of complete graphs with trees and being used on many ...
Antoni W. Mazurkiewicz