[图书][B] Principles of model checking

C Baier, JP Katoen - 2008 - books.google.com
A comprehensive introduction to the foundations of model checking, a fully automated
technique for finding flaws in hardware and software; with extensive examples and both …

Computer-aided security proofs for the working cryptographer

G Barthe, B Grégoire, S Heraud… - Annual Cryptology …, 2011 - Springer
We present EasyCrypt, an automated tool for elaborating security proofs of cryptographic
systems from proof sketches–compact, formal representations of the essence of a proof as a …

Stochastic activity networks: formal definitions and concepts⋆

WH Sanders, JF Meyer - School organized by the European Educational …, 2000 - Springer
Stochastic activity networks have been used since the mid-1980s for performance,
dependability, and performability evaluation. They have been used as a modeling formalism …

Formal certification of code-based cryptographic proofs

G Barthe, B Grégoire, S Zanella Béguelin - Proceedings of the 36th …, 2009 - dl.acm.org
As cryptographic proofs have become essentially unverifiable, cryptographers have argued
in favor of developing techniques that help tame the complexity of their proofs. Game-based …

[图书][B] Process algebra: equational theories of communicating processes

JCM Baeten, MA Reniers - 2010 - books.google.com
Process algebra is a widely accepted and much used technique in the specification and
verification of parallel and distributed software systems. This book sets the standard for the …

Probabilistic relational reasoning for differential privacy

G Barthe, B Köpf, F Olmedo… - Proceedings of the 39th …, 2012 - dl.acm.org
Differential privacy is a notion of confidentiality that protects the privacy of individuals while
allowing useful computations on their private data. Deriving differential privacy guarantees …

Model checking probabilistic systems

C Baier, L de Alfaro, V Forejt… - Handbook of Model …, 2018 - Springer
The model-checking approach was originally formulated for verifying qualitative properties
of systems, for example safety and liveness (see Chap. 2), and subsequently extended to …

Proving differential privacy via probabilistic couplings

G Barthe, M Gaboardi, B Grégoire, J Hsu… - Proceedings of the 31st …, 2016 - dl.acm.org
Over the last decade, differential privacy has achieved widespread adoption within the
privacy community. Moreover, it has attracted significant attention from the verification …

Probabilistic relational verification for cryptographic implementations

G Barthe, C Fournet, B Grégoire, PY Strub… - ACM SIGPLAN …, 2014 - dl.acm.org
Relational program logics have been used for mechanizing formal proofs of various
cryptographic constructions. With an eye towards scaling these successes towards end-to …

Distributing probability over non-determinism

D Varacca, G Winskel - Mathematical structures in computer science, 2006 - cambridge.org
We study the combination of probability and non-determinism from a categorical point of
view. In category theory, non-determinism and probability are represented by suitable …