Showing 21 - 27 results of 27 for search '"formal verification"', query time: 0.04s Refine Results
  1. 21

    Modelling and Assertion-Based Verification of Run-Time Reconfigurable Designs Using Functional Programming Abstractions by Bahram N. Uchevler, Kjetil Svarstad

    Published 2018-01-01
    “…Assertions can be used to verify specifications of designs in different verification methods such as simulation-based and formal verification. A partitioning algorithm is proposed for clustering the assertion-checker circuits to implement the verification circuits in a limited reconfigurable area in the target FPGA. …”
    Get full text
    Article
  2. 22

    EAP-Based Group Authentication and Key Agreement Protocol for Machine-Type Communications by Rong Jiang, Chengzhe Lai, Jun Luo, Xiaoping Wang, Hong Wang

    Published 2013-11-01
    “…Detailed security analysis has shown that the proposed EG-AKA protocol is secure in terms of user and group identity protection and resistance to several attacks. Furthermore, formal verification implemented in AVISPA proves that the proposed protocol is secure against various malicious attacks. …”
    Get full text
    Article
  3. 23

    An Innovative Approach for Modelling Urban Road Traffic Using Timed Automata and Formal Methods by Eduardo Valente, Camelia Avram, José Machado, Adina Astilean

    Published 2018-01-01
    “…For this purpose, modelling formalisms (cellular automata and timed automata) and analysis techniques (simulation and formal verification) are proposed to reach the main goals of modelling complex and adaptable behaviours in urban road traffic with multiple over time changeable configurations. …”
    Get full text
    Article
  4. 24

    Formal Analysis of Fairness for Optimistic Multiparty Contract Signing Protocol by Xiaoru Li, Xiaohong Li, Guangquan Xu, Jing Hu, Zhiyong Feng

    Published 2014-01-01
    “…It thus presents a challenge for formal verification. In our analysis, we employ and combine the strength of extended modeling language CSP# and linear temporal logic (LTL) to verify the fairness of OMPCS protocols. …”
    Get full text
    Article
  5. 25

    Review of the Urinary Schistosomiasis Control in Morocco (1960–2018) by A. Balahbib, F. Amarir, S. Bouhout, M. Rhajaoui, E. Adlaoui, A. Sadak

    Published 2020-01-01
    “…The Ministry of Health is planning to implement final confirmatory surveys before requesting WHO to proceed with the formal verification process.…”
    Get full text
    Article
  6. 26

    Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT by Kisung Park, Myeonghyun Kim, Youngho Park

    Published 2025-01-01
    “…We prove our findings using the automated validation of internet security protocols and applications, a widely recognized formal verification tool. To strengthen attack resilience, we propose several recommendations for the advancement of more robust and efficient AKA protocols specifically designed for IoT environments.…”
    Get full text
    Article
  7. 27

    Analysis and improvement for authentication protocols of mobile ad hoc network with CSP approach by Li-cai LIU, Li-hua YIN, Yun-chuan GUO, Yan SUN

    Published 2013-08-01
    “…However, a vulnerable protocol might bring more serious threats to MANET. As a result, formal verifications of security protocols become more important. …”
    Get full text
    Article