Cooperation of | CWI, TU/e and VUA |
People involved | Suzana Andova, Jos Baeten, Alexandru Baltag, Falk Bartels, Jaco de Bakker, Perry Groot, Jerry den Hartog, Jan Rutten and Erik de Vink |
Project description | Process algebraic and coalgebraic techniques are combined in order to model discrete and continuous probabilistic behaviour. In particular the notion of probabilistic bisimulation is investigated. |
Cooperation of | Department of Mathematics and Computer Science and the Department of Electrical Engineering of TU/e |
People involved | Jos Baeten, Dmitri Chkliaev, Yusuf Pribadi, Ana Sokolova, Mario Stevens, Bart Theelen, Erik de Vink, Simona Vlad, Jeroen Voeten and Zhangqin Huang |
Project description | The project concerns design methods for telecommunication systems, in particular the exploitation of process algebra for the semantic foundations of models and performance analysis techniques. |
Industrial partners | KPN Research, Leidschendam, NL; Lucent Technologies, Huizen, NL; TNO-FEL, The Hague, NL; IBM-Research, Zurich, CH; Alacatel, Antwerp, BE |
URL | http://www.eesi.tue.nl/projecten/EES5202/index.html |
Cooperation of | TU/e and TNO |
People involved | Jerry den Hartog, Sjouke Mauw, Jan Verschuren, Erik de Vink, Jaap de Vos |
Project description | Vulnerability test for algorithms on smart cards against powerattacks are commonly performed on smartcard implementations themselves. This project seeks to model these algorithms and the attacks on a virtual machine. In a later stage the automation of higher-order attack-scenarios will be worked out. |
Cooperation of | KUN and TU/e |
People involved | Cas Cremers, Bart Jacobs, Sjouke Mauw, Martijn Oostdijk, Erik Poll, Erik de Vink, Martijn Warnier |
Project description | The project focuses on security protocols for multi-applet smart cards taking the total security environment --trusted and untrusted applets, applet platform, smart card environment-- into account. We seek to combine existing techniques and to use theorem provers for the formal verification of multi-applet security protocols in the setting of mobile commerce and for applet downloading. |