The Verifier

Results: 204



#Item
21Software engineering / Theoretical computer science / Computer programming / Formal methods / Logic in computer science / Macro / Hoare logic / Assertion / Separation logic / C preprocessor / Postcondition / Assembly language

The Bedrock Structured Programming System Combining Generative Metaprogramming and Hoare Logic in an Extensible Program Verifier Adam Chlipala MIT CSAIL

Add to Reading List

Source URL: adam.chlipala.net

Language: English - Date: 2016-01-02 15:47:17
22

Where is the value in a Program Verifier? The Systems Assurance Group at QinetiQ in Malvern has used mechanical proof techniques to verify three successive versions of Typhoon’s flight control laws implemented in Ada.

Add to Reading List

Source URL: vstte.ethz.ch

Language: English - Date: 2005-10-11 03:37:08
    23

    Automatic Verification of Cryptographic Protocols in the Formal Model Automatic Verifier ProVerif Bruno Blanchet ´ CNRS, Ecole

    Add to Reading List

    Source URL: prosecco.gforge.inria.fr

    Language: English - Date: 2012-10-01 07:25:57
      24

      The automatic security protocol verifier ProVerif

      Add to Reading List

      Source URL: prosecco.gforge.inria.fr

      Language: English - Date: 2012-10-01 07:25:52
        25

        Automatic Verification of Cryptographic Protocols in the Symbolic Model Automatic Verifier ProVerif

        Add to Reading List

        Source URL: prosecco.gforge.inria.fr

        Language: English - Date: 2013-09-02 11:47:42
          26

          AVERANT ANNOUNCES SOLIDTC: TIMING CONSTRAINTS VERIFIER Alameda, Calif. – January 24, 2005 – Averant Inc., a leading provider of advanced verification technology for RTL designs, today announces the availability of So

          Add to Reading List

          Source URL: averant.com

          Language: English - Date: 2014-08-12 10:49:07
            27Computational hardness assumption / Ciphertext indistinguishability / Computer security / Cyberwarfare / Science / Cryptography / Cryptographic primitive / Information-theoretic security

            Proving Computational Security with a General-Purpose C Verifier A 5-Minute Talk Fran¸cois Dupressoir The Open University

            Add to Reading List

            Source URL: csf2012.seas.harvard.edu

            Language: English - Date: 2012-07-05 18:15:11
            28De Biesbosch / North Brabant / South Holland / Types of tourism / Dordrecht / Sustainable tourism / Staatsbosbeheer / Tourism / Sliedrecht / Provinces of the Netherlands / Rhine–Meuse–Scheldt delta / Geography of the Netherlands

            Verifier’s Report to the Evaluation Committee Name of protected area:Nationaal Park De Biesbosch Name of verifier: Marja van Loef Date of submission of application by protected area: Date of verification vis

            Add to Reading List

            Source URL: www.step-projects.eu

            Language: English - Date: 2012-10-29 05:50:42
            29Cryptography / Distance-bounding protocol / IP / NP / Alice and Bob / Formal verification / Challenge-response authentication / The Verifier / Transmission Control Protocol / Theoretical computer science / Cryptographic protocols / Applied mathematics

            Secure Verification of Location Claims∗ Naveen Sastry Umesh Shankar David Wagner

            Add to Reading List

            Source URL: naveen.ksastry.com

            Language: English - Date: 2013-06-08 15:25:49
            30Education in the United Kingdom / Qualifications and Credit Framework / RPL / National Qualifications Framework / Recognition of prior learning / Space Shuttle Main Engine / Waste / Academic transfer / Knowledge / Education

            WELCOME! WAMITAB ASSESSOR/VERIFIER FORUM Armada House 2 OCTOBER 2014

            Add to Reading List

            Source URL: www.wamitab.org.uk

            Language: English - Date: 2014-10-07 13:41:38
            UPDATE