منابع مشابه
Heuristic Methods for Security Protocols
Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security property-dependent heuristic. The heuristic weights the state space by exploiting the security formulae; the weights may then be used to explor...
متن کاملLiver Stem Cells - Methods and Protocols
The brief and concise preface written by Prof. Takahiro Ochiya is particularly well addressed to scholars belonging to different scientific fields: cellular and molecular biology, liver and cancer biology, tissue engineering and stem cell therapy. By a few lines prof Ochiya is telling us that we are getting exciting results, at the lab and the preclinical level, in treating liver injuries thank...
متن کاملLanguage, Semantics, and Methods for Cryptographic Protocols
In this report we present a process language for security protocols together with an operational semantics and an alternative semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. This Petri-net semantics has a strong relation to both Paulson’s inductive set o...
متن کاملRNA: methods and protocols — a new series
This month, Silence launches a new series on methods and protocols to study silencing pathways and analyze nucleic acids and proteins.
متن کاملAnalysing Industrial Protocols with Formal Methods
test cases ? 2. test realisation executable test cases
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: European Journal of Histochemistry
سال: 2010
ISSN: 2038-8306,1121-760X
DOI: 10.4081/ejh.2010.e26