Currently displaying 1 – 4 of 4

Showing per page

Order by Relevance | Title | Year of publication

About the decision of reachability for register machines

Véronique Cortier — 2002

RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications

We study the decidability of the following problem: given p affine functions f 1 , ... , f p over k and two vectors v 1 , v 2 k , is v 2 reachable from v 1 by successive iterations of f 1 , ... , f p (in this given order)? We show that this question is decidable for p = 1 , 2 and undecidable for some fixed p .

About the decision of reachability for register machines

Véronique Cortier — 2010

RAIRO - Theoretical Informatics and Applications

We study the decidability of the following problem: given  affine functions ƒ,...,ƒ over k and two vectors v 1 , v 2 k , is reachable from by successive iterations of ƒ,...,ƒ (in this given order)? We show that this question is decidable for and undecidable for some fixed .

Deciding knowledge in security protocols under some e-voting theories

Mouhebeddine BerrimaNarjes Ben RajebVéronique Cortier — 2011

RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications

In the last decade, formal methods have proved their interest when analyzing security protocols. Security protocols require in particular to reason about the attacker knowledge. Two standard notions are often considered in formal approaches: deducibility and indistinguishability relations. The first notion states whether an attacker can learn the value of a secret, while the latter states whether an attacker can notice some difference between protocol runs with different values of the secret. Several...

Deciding knowledge in security protocols under some e-voting theories

Mouhebeddine BerrimaNarjes Ben RajebVéronique Cortier — 2011

RAIRO - Theoretical Informatics and Applications

In the last decade, formal methods have proved their interest when analyzing security protocols. Security protocols require in particular to reason about the attacker knowledge. Two standard notions are often considered in formal approaches: deducibility and indistinguishability relations. The first notion states whether an attacker can learn the value of a secret, while the latter states whether an attacker can notice some difference between protocol runs with different values of the secret. Several...

Page 1

Download Results (CSV)