[HTML][HTML] Innovations in computational type theory using Nuprl

SF Allen, M Bickford, RL Constable, R Eaton… - Journal of Applied …, 2006 - Elsevier
For twenty years the Nuprl (“new pearl”) system has been used to develop software systems
and formal theories of computational mathematics. It has also been used to explore and …

What is" next" in event processing?

W White, M Riedewald, J Gehrke… - Proceedings of the twenty …, 2007 - dl.acm.org
Event processing systems have wide applications ranging from managing events from RFID
readers to monitoring RSS feeds. Consequently, there exists much work on them in the …

Trace-based verification of imperative programs with I/O

G Malecha, G Morrisett, R Wisnesky - Journal of Symbolic Computation, 2011 - Elsevier
In this paper we demonstrate how to prove the correctness of systems implemented using
low-level imperative features like pointers, files, and socket I/O with respect to high level I/O …

A novel approach to automatic security protocol analysis based on authentication event logic

M Xiao, C Ma, C Deng, K Zhu - Chinese Journal of Electronics, 2015 - Wiley Online Library
Since security protocols form the cornerstones of modern secure networked systems, it is
important to develop informative, accurate, and deployable approach for finding errors and …

Proving authentication property of PUF-based mutual authentication protocol based on logic of events

J Song, M Xiao, T Zhang, H Zhou - Soft Computing, 2022 - Springer
PUF (Physical unclonable function) is a new hardware security primitive, and the research
on PUFs is one of the emerging research focuses. For PUF-based mutual authentication …

Unguessable atoms: A logical foundation for security

M Bickford - Working Conference on Verified Software: Theories …, 2008 - Springer
We show how a type of atoms, which behave like urelements, and a new proposition that
expresses the independence of a term from an atom can be added to any logical system …

Logic of events for proving security properties of protocols

M Xiao, M Bickford - … on Web Information Systems and Mining, 2009 - ieeexplore.ieee.org
Formal methods are vital for ensuring the security and reliability of the network systems. We
propose a promising method to check security properties of cryptographic protocols using …

Formal Logical Methods for System Security and Correctness 29 O. Grumberg et al.(Eds.) IOS Press, 2008© 2008 IOS Press. All rights reserved. Formal Foundations …

M Bickford, R Constable - Formal Logical Methods for System …, 2008 - books.google.com
We would like to know with very high confidence that private data in computers is not
unintentionally disclosed and that only authorized persons or processes can modify it …

Knowledge-based synthesis of distributed systems using event structures

M Bickford, R Constable, J Halpern… - Logical Methods in …, 2011 - lmcs.episciences.org
To produce a program guaranteed to satisfy a given specification one can synthesize it from
a formal constructive proof that a computation satisfying that specification exists. This …

LoET-E: A refined theory for proving security properties of cryptographic protocols

J Song, M Xiao, K Yang, X Wang, X Zhong - IEEE Access, 2019 - ieeexplore.ieee.org
Nowadays, more and more new cryptographic protocols are emerging, and the security
analysis of emerging cryptographic protocols is increasingly important. The logic of events is …