-
21
Modelling and Assertion-Based Verification of Run-Time Reconfigurable Designs Using Functional Programming Abstractions
Published 2018-01-01“…Assertions can be used to verify specifications of designs in different verification methods such as simulation-based and formal verification. A partitioning algorithm is proposed for clustering the assertion-checker circuits to implement the verification circuits in a limited reconfigurable area in the target FPGA. …”
Get full text
Article -
22
EAP-Based Group Authentication and Key Agreement Protocol for Machine-Type Communications
Published 2013-11-01“…Detailed security analysis has shown that the proposed EG-AKA protocol is secure in terms of user and group identity protection and resistance to several attacks. Furthermore, formal verification implemented in AVISPA proves that the proposed protocol is secure against various malicious attacks. …”
Get full text
Article -
23
An Innovative Approach for Modelling Urban Road Traffic Using Timed Automata and Formal Methods
Published 2018-01-01“…For this purpose, modelling formalisms (cellular automata and timed automata) and analysis techniques (simulation and formal verification) are proposed to reach the main goals of modelling complex and adaptable behaviours in urban road traffic with multiple over time changeable configurations. …”
Get full text
Article -
24
Formal Analysis of Fairness for Optimistic Multiparty Contract Signing Protocol
Published 2014-01-01“…It thus presents a challenge for formal verification. In our analysis, we employ and combine the strength of extended modeling language CSP# and linear temporal logic (LTL) to verify the fairness of OMPCS protocols. …”
Get full text
Article -
25
Review of the Urinary Schistosomiasis Control in Morocco (1960–2018)
Published 2020-01-01“…The Ministry of Health is planning to implement final confirmatory surveys before requesting WHO to proceed with the formal verification process.…”
Get full text
Article -
26
Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT
Published 2025-01-01“…We prove our findings using the automated validation of internet security protocols and applications, a widely recognized formal verification tool. To strengthen attack resilience, we propose several recommendations for the advancement of more robust and efficient AKA protocols specifically designed for IoT environments.…”
Get full text
Article -
27
Analysis and improvement for authentication protocols of mobile ad hoc network with CSP approach
Published 2013-08-01“…However, a vulnerable protocol might bring more serious threats to MANET. As a result, formal verifications of security protocols become more important. …”
Get full text
Article