-
601
Design of access authentication schemes in 5G wireless networks
Published 2021“…After that, for each proposal, we evaluate its security and logical correctness using formal verification tools. Performance evaluations for each scheme also show that the proposed schemes are computationally and spatially efficient while maintaining a high level of security.…”
Get full text
Thesis-Master by Research -
602
Abstraction discovery and refinement for model checking by symbolic trajectory evaluation
Published 2014“…<p>This dissertation documents two contributions to automating the formal verification of hardware – particularly memory-intensive circuits – by Symbolic Trajectory Evaluation (STE), a model checking technique based on symbolic simulation over abstract sets of states. …”
Thesis -
603
Analysis and mitigation of information exposure on interest management in massively multiplayer online games
Published 2017“…We hope this thesis can be valuable to academia especially on privacy preserving computation, hardware virtualization, trusted computing and formal verification. The proposed evaluation properties can become a widely used standard for evaluating IM schemes. …”
Get full text
Thesis -
604
Efficient and secure mobility support in 6LoWPAN networks
Published 2017“…The logic correctness of the proposed schemes is proved by the protocol logic. The formal verification by the verification tools and the performance evaluation results show that the proposed security schemes for 6LoWPAN networks could not only enhance the security functionalities with the ability to prevent various malicious attacks but also be computationally efficient.…”
Get full text
Thesis -
605
-
606
Investigation of security functionality in smart grid
Published 2018“…Compared to a theory analysis, formal verification, logic proof and performance evaluation are implemented for these three solutions in this project as well. …”
Get full text
Final Year Project (FYP) -
607
Countering the Cognitive, Linguistic, and Psychological Underpinnings Behind Susceptibility to Fake News: A Review of Current Literature With Special Focus on the Role of Age and D...
Published 2021-07-01“…The spread of information without formal verification increased since the introduction of social media and online news channels. …”
Get full text
Article -
608
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The proposed schemes have been validated using informal and formal security verification to compare the achieved security features against various attacks. The formal verification is performed using BAN logic to prove the security and mutual authentications. …”
Get full text
Thesis -
609
Toward efficient attribute-based searchable encryption for access control over blockchain
Published 2021“…Furthermore, security validation is verified by simulating a formal verification scenario using Automated Validation of Internet Security Protocols and Applications (AVISPA), thereby unveiling that BC-ABSE is resistant to man-in-themiddle (MIM) and replay attacks. …”
Get full text
Thesis -
610
Security and performance enhancement of authentication protocols in heterogeneous wireless networks
Published 2017“…The Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is used to provide a formal verification. Results show that the proposed protocols are efficient and secure against active and passive attacks.…”
Get full text
Thesis -
611
Parallelizing model checking algorithms using multi-core and many-core architectures
Published 2017“…To the best of our knowledge, there is no tool support for the formal verification of quantum communication systems, including both the general model checking and the automatic quantum bisimilarity checking. …”
Get full text
Thesis -
612
Automatic program analysis and verification and their applications in smart contracts
Published 2021“…Lastly, the generated semantics facilitates the formal verification of smart contracts written in a particular high-level programming language as a formal specification of the corresponding language. …”
Get full text
Thesis-Doctor of Philosophy -
613
The Spotlight Principle
Published 2007“…Formal verification of safety and liveness properties of systems with a dynamically changing, unbounded number of interlinked processes and infinite-domain local data is challenging due to the two sources of infiniteness. …”
Conference item -
614
Maintaining the Feasibility of Hard Real–Time Systems with a Reduced Number of Priority Levels
Published 2015-12-01“…The theoretical correctness of both contributions is checked through formal verifications. Moreover, the experimental results reveal the superiority of our work over the existing feasibility tests by reducing the number of scheduling points that are needed otherwise.…”
Get full text
Article -
615
Formalisations and applications of business process modelling notation
Published 2011“…The primary objective of this thesis is to provide a framework for precise specifications and formal verifications of workflow processes modelled as BPMN diagrams. …”
Thesis -
616
Modelling and verifying dynamic access control policies in workflow-based healthcare systems
Published 2020“…Since healthcare systems are critical systems, where errors can be very costly in terms of lives, quality of life, and/or dollars, it is crucial to identify discrepancies between policy specifications and their intended function to implement correctly a flexible access control system. Formal verifications are necessary for exhaustive verification and validation of policy specifications to ensure that the policy specifications truly encapsulate the desires of the policy authors. …”
Get full text
Article -
617
A Comprehensive Formalization of Propositional Logic in Coq: Deduction Systems, Meta-Theorems, and Automation Tactics
Published 2023-05-01“…This work holds particular importance in the domains of mathematical formalization, verification of software and hardware security, and in enhancing comprehension of the principles of logical reasoning.…”
Get full text
Article