Search for dissertations about: "decidability"
Showing result 1 - 5 of 13 swedish dissertations containing the word decidability.
-
1. Verification of networks of communicating processes : Reachability problems and decidability issues
Abstract : Computer systems are used in almost all aspects of our lives and our dependency on them keeps on increasing. When computer systems are used to handle critical tasks, any software failure can cause severe human and/or material losses. READ MORE
-
2. Model Checking Parameterized Timed Systems
Abstract : In recent years, there has been much advancement in the area of verification of infinite-state systems. A system can have an infinite state-space due to unbounded data structures such as counters, clocks, stacks, queues, etc. It may also be infinite-state due to parameterization, i.e. READ MORE
-
3. On Simultaneous Rigid E-Unification
Abstract : Automated theorem proving methods in classical logic with equality that are based on the Herbrand theorem, reduce to a problem called Simultaneous Rigid E-Unification, or SREU for short. Recent developments show that SREU has also close connections with intuitionistic logic with equality, second-order unification, some combinatorial problems and finite tree automata. READ MORE
-
4. Logics of Knowledge and Cryptography : Completeness and Expressiveness
Abstract : An understanding of cryptographic protocols requires that we examine the knowledge of protocol participants and adversaries: When a participant receives a message, does she know who sent it? Does she know that the message is fresh, and not merely a replay of some old message? Does a network spy know who is talking to whom? This thesis studies logics of knowledge and cryptography. Specifically, the thesis addresses the problem of how to make the concept of knowledge reflect feasible computability within a Kripke-style semantics. READ MORE
-
5. Equivalences and Calculi for Formal Verification of Cryptographic Protocols
Abstract : Security protocols are essential to the proper functioning of any distributed system running over an insecure network but often have flaws that can be exploited even without breaking the cryptography. Formal cryptography, the assumption that the cryptographic primitives are flawless, facilitates the construction of formal models and verification tools. READ MORE