Printed Copies: Printed Copies: Obdd-based Veriication of Communication Protocols { Methods for the Veriication of Data Link Protocols Obdd-based Veriication of Communication Protocols { Methods for the Veriication of Data Link Protocols

نویسندگان

  • Christoph Meinel
  • Christian Stangier
چکیده

Electronic copies of technical reports are available: Via FTP: URL ftp://ftp.informatik.uni-trier.de/pub/Users-Root/reports Via WWW: URL http://www.informatik.uni-trier.de/Reports/Current.html Via email: Send a mail to [email protected], subject ’HELP’, for detailed instructions Printed copies: Trierer Forschungsberichte Fachbereich IV Mathematik / Informatik Universitat Trier ..

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysing Bang & Olufsen's BeoLink® Audio/Video System Using Coloured Petri Nets

Bang & Olufsen A/S (B&O) is a renowned manufacturer of audio and video products. Their BeoLink® (BeoLink) system distributes sound and vision throughout a home via a network. In this way, e.g., while doing the cooking in the kitchen, a person can remotely select and listen to a track from a CD loaded in the CD player situated in the living room. To resolve connicts, synchronisation between vari...

متن کامل

Re - Usable Veri cation Elements forHigh - Speed Transfer

Presently, many communication protocols are under development which are tailored to the eecient high-speed data transfer meeting diierent application-speciic requirements. Our approach concentrates on a framework which facilitates the formal veriication of the protocols. The framework supplies veriied and re-usable implications between predeened protocol and service speciication components. For...

متن کامل

Translation between S/r and Promela

S/R and Promela are two concurrent programming languages used in nite state automated veriication of communication protocols. The semantics of S/R supports synchronous parallel composition, while semantics of Promela supports an interleaving parallel composition of processes. Because of the diierences in the execution model, the veriication tools available for the models written in these langua...

متن کامل

Breaking Security Protocols as an AI Planning Problem

Properties like conndentiality, authentication and integrity are of increasing importance to communication protocols. Hence the development of formal methods for the veriication of security protocols. This paper proposes to represent the veriication of security properties as a (deductive or model-based) logical AI planning problem. The key intuition is that security attacks can be seen as plans...

متن کامل

Server (Prover/Signer)-Aided Verification of Identity Proofs and Signatures

Discrete log based identiication and signature schemes are well-suited to identity proof and signature generation, but not suitable for veriication, by smart cards, due to their highly asymmetric computational load between the prover/signer and the veriier. In this paper, we present very eecient and practical protocols for fast veriication in these schemes, where the veriier with limited comput...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997