• Calculating information leakage using model checking tools 

    Chen, Jia (University of Missouri--Columbia, 2014)
    A confidential program should not allow any information about its secret inputs to be inferred from its public outputs. As such confidentiality is difficult to achieve in practice, it has been proposed in literature to ...
  • Dynamic agent safety logic : theory and applications 

    Ahrenbach, Seth (University of Missouri--Columbia, 2019)
    Modal logic is a family of logics for reasoning about relational structures, broadly construed. It sits at the nexus of philosophy, mathematics, software engineering, and economics. By modeling a target domain as a relational ...
  • Machine-aided analysis of vote privacy using computationally complete symbolic attacker 

    Eeralla, Ajay Kumar (University of Missouri--Columbia, 2019)
    Security protocols employ cryptographic primitives such as encryption and digital signatures to provide security guarantees of confidentiality and authenticity in the presence of malicious attackers. Due to the complexities ...