-
3
-
-
0031643297
-
The Inductive Approach to Verifying Cryptographic Protocols
-
L. C. Paulson. The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security, 6:85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
8
-
-
35248824449
-
Model-Checking a Secure Group Communication Protocol: A Case Study
-
A. J. Hu, R. Li, X. Shi and S. T. Vuong: Model-Checking a Secure Group Communication Protocol: A Case Study. In Proc. FORTE/PSTV, pp. 469-478, 1999.
-
(1999)
Proc. FORTE/PSTV
, pp. 469-478
-
-
Hu, A.J.1
Li, R.2
Shi, X.3
Vuong, S.T.4
-
9
-
-
0041999496
-
Verifying Randomized Byzantine Agreement
-
Proc. FORTE
-
M. Kwiatkowska and G. Norman. Verifying Randomized Byzantine Agreement. In Proc. FORTE (LNCS 2529), pp. 194-209, 2002.
-
(2002)
LNCS
, vol.2529
, pp. 194-209
-
-
Kwiatkowska, M.1
Norman, G.2
-
10
-
-
0001229793
-
A Formally Verified Algorithm for Interactive Consistency under a Hybrid Fault Model
-
P. Lincoln and J. Rushby. A Formally Verified Algorithm for Interactive Consistency under a Hybrid Fault Model. In Proc. Fault Tolerant Computing Symposium, pp. 304-313, 1993.
-
(1993)
Proc. Fault Tolerant Computing Symposium
, pp. 304-313
-
-
Lincoln, P.1
Rushby, J.2
-
11
-
-
84949216703
-
Revisiting the PAXOS Algorithm
-
Proc. Intl. Workshop on Distributed Algorithms
-
R. De Prisco, B. Lampson, N. Lynch. Revisiting the PAXOS Algorithm. In Proc. Intl. Workshop on Distributed Algorithms, (LNCS 1320), pp. 111-125, 1997.
-
(1997)
LNCS
, vol.1320
, pp. 111-125
-
-
De Prisco, R.1
Lampson, B.2
Lynch, N.3
-
12
-
-
0004505683
-
Action Transducers and Timed Automata
-
N. Lynch and F. Vaandrager. Action Transducers and Timed Automata. In Formal Aspects of Computing, 8(5):499-538, 1996.
-
(1996)
Formal Aspects of Computing
, vol.8
, Issue.5
, pp. 499-538
-
-
Lynch, N.1
Vaandrager, F.2
-
14
-
-
84948945922
-
Specifications and Proofs for Ensemble Layers
-
Proc. Intl. Conf. on Tools and Algorithms for the Construction and Analysis of Systems
-
J. Hickey, N. Lynch, and R. van Renesse. Specifications and Proofs for Ensemble Layers. In Proc. Intl. Conf. on Tools and Algorithms for the Construction and Analysis of Systems, (LNCS 1579), pp. 119-133, 1999.
-
(1999)
LNCS
, vol.1579
, pp. 119-133
-
-
Hickey, J.1
Lynch, N.2
Van Renesse, R.3
-
17
-
-
84957354474
-
Verifying Systems with Replicated Components in Murphi
-
Proc. of the Intl. Conf. on Computer-Aided Verification
-
C. Norris Ip and D. L. Dill. Verifying Systems with Replicated Components in Murphi. In Proc. of the Intl. Conf. on Computer-Aided Verification (LNCS 1102), pp. 147-158, 1996.
-
(1996)
LNCS
, vol.1102
, pp. 147-158
-
-
Norris Ip, C.1
Dill, D.L.2
-
18
-
-
0018545449
-
How to Share a Secret
-
A. Shamir. How to Share a Secret. In Comm. of the ACM, 22:612-613, 1979.
-
(1979)
Comm. of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
21
-
-
84944677742
-
PVS: A Prototype Verification System
-
Proc. Intl. Conf. on Automated Deduction
-
S. Owre, J. M. Rushby, and N. Shankar. PVS: A Prototype Verification System. In Proc. Intl. Conf. on Automated Deduction, (LNCS 607), pp. 748-752, 1992.
-
(1992)
LNCS
, vol.607
, pp. 748-752
-
-
Owre, S.1
Rushby, J.M.2
Shankar, N.3
-
22
-
-
84947778144
-
The decision Diffie-Hellman problem
-
Proc. of the Third Algorithmic Number Theory Symposium
-
D. Boneh. The decision Diffie-Hellman problem. In Proc. of the Third Algorithmic Number Theory Symposium, (LNCS 1423), pp. 48-63, 1998.
-
(1998)
LNCS
, vol.1423
, pp. 48-63
-
-
Boneh, D.1
|