[图书][B] Principles of model checking
A comprehensive introduction to the foundations of model checking, a fully automated
technique for finding flaws in hardware and software; with extensive examples and both …
technique for finding flaws in hardware and software; with extensive examples and both …
Computer-aided security proofs for the working cryptographer
G Barthe, B Grégoire, S Heraud… - Annual Cryptology …, 2011 - Springer
We present EasyCrypt, an automated tool for elaborating security proofs of cryptographic
systems from proof sketches–compact, formal representations of the essence of a proof as a …
systems from proof sketches–compact, formal representations of the essence of a proof as a …
Stochastic activity networks: formal definitions and concepts⋆
WH Sanders, JF Meyer - School organized by the European Educational …, 2000 - Springer
Stochastic activity networks have been used since the mid-1980s for performance,
dependability, and performability evaluation. They have been used as a modeling formalism …
dependability, and performability evaluation. They have been used as a modeling formalism …
Formal certification of code-based cryptographic proofs
As cryptographic proofs have become essentially unverifiable, cryptographers have argued
in favor of developing techniques that help tame the complexity of their proofs. Game-based …
in favor of developing techniques that help tame the complexity of their proofs. Game-based …
[图书][B] Process algebra: equational theories of communicating processes
JCM Baeten, MA Reniers - 2010 - books.google.com
Process algebra is a widely accepted and much used technique in the specification and
verification of parallel and distributed software systems. This book sets the standard for the …
verification of parallel and distributed software systems. This book sets the standard for the …
Probabilistic relational reasoning for differential privacy
Differential privacy is a notion of confidentiality that protects the privacy of individuals while
allowing useful computations on their private data. Deriving differential privacy guarantees …
allowing useful computations on their private data. Deriving differential privacy guarantees …
Model checking probabilistic systems
The model-checking approach was originally formulated for verifying qualitative properties
of systems, for example safety and liveness (see Chap. 2), and subsequently extended to …
of systems, for example safety and liveness (see Chap. 2), and subsequently extended to …
Proving differential privacy via probabilistic couplings
Over the last decade, differential privacy has achieved widespread adoption within the
privacy community. Moreover, it has attracted significant attention from the verification …
privacy community. Moreover, it has attracted significant attention from the verification …
Probabilistic relational verification for cryptographic implementations
Relational program logics have been used for mechanizing formal proofs of various
cryptographic constructions. With an eye towards scaling these successes towards end-to …
cryptographic constructions. With an eye towards scaling these successes towards end-to …
Distributing probability over non-determinism
We study the combination of probability and non-determinism from a categorical point of
view. In category theory, non-determinism and probability are represented by suitable …
view. In category theory, non-determinism and probability are represented by suitable …