Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ernie Cohen is active.

Publication


Featured researches published by Ernie Cohen.


mathematics of program construction | 2000

Separation and Reduction

Ernie Cohen

We present some new theorems that equate an iteration to a sequential composition of stronger iterations, and use these theorems to simplify and generalize a number of known techniques for pretending atomicity in concurrent programs.


ieee computer security foundations symposium | 2000

TAPS: a first-order verifier for cryptographic protocols

Ernie Cohen

We describe a proof method for cryptographic protocols, based on a strong secrecy invariant that catalogues conditions under which messages can be published. For typical protocols, a suitable first-order invariant can be generated automatically from the program text, independent of the properties being verified, allowing safety properties to be proved by ordinary first-order reasoning. We have implemented the method in an automatic verifier, TAPS, that proves safety properties roughly equivalent to those in published Isabelle verifications, but does so much faster (usually within a few seconds) and with little or no guidance from the user. We have used TAPS to analyze about 60 protocols, including all but three protocols from the Clark and Jacob survey; on average, these verifications each require less than 4 seconds of CPU time and less than 4 bytes of hints from the user.


ACM Transactions on Computational Logic | 2000

A note on the complexity of propositional Hoare logic

Ernie Cohen; Dexter Kozen

We provide a simpler alternative proof of the <italic>PSPACE</italic>-hardness of propositional Hoare logic (PHL).


computer aided verification | 2000

TAPS: A First-Order Verifier for Cryptographic Protocols

Ernie Cohen

We describe a proof method for cryptographic protocols, based on a strong secrecy invariant that catalogues conditions under which messages can be published. For typical protocols, a suitable first-order invariant can be generated automatically from the program text, independent of the properties being verified, allowing safety properties to be proved by ordinary first-order reasoning. We have implemented the method in an automatic verifier, TAPS, that proves safety properties roughly equivalent to those in published Isabelle verifications, but does so much faster (usually within a few seconds) and with little or no guidance from the user. We have used TAPS to analyze about 60 protocols, including all but three protocols from the Clark and Jacob survey; on average, these verifications each require less than 4 seconds of CPU time and less than 4 bytes of hints from the user.


Archive | 1996

The Complexity of Kleene Algebra with Tests

Ernie Cohen; Dexter Kozen; Frederick Smith


international workshop on security | 2003

Legally authorized and unauthorized digital evidence. Discussion

Hiroshi Yoshiura; Kunihiko Miyazaki; Shinji Itoh; Kazuo Takaragi; Ryoichi Sasaki; Ernie Cohen; Bruce Christianson; Richard Clayton; Pekka Nikander; Ross J. Anderson


international workshop on security | 2003

Analyzing delegation properties. Discussion

Giampaolo Bellal; Lawrence C. Paulson; Ernie Cohen; Bruce Christianson; Matt Blaze


international workshop on security | 2003

A structured operational modelling of the Dolev-Yao threat model. Discussion

Wenbo Mao; Pekka Nikander; Virgil D. Gligor; Lawrence C. Paulson; Bruce Christianson; Ernie Cohen


Lecture Notes in Computer Science | 2003

Confidentiality levels and deliberate/indeliberate protocol attacks. Discussion

Giampaolo Bella; Stefano Bistarelli; Ernie Cohen; James G. Malcolm


Lecture Notes in Computer Science | 2003

An architecture for an adaptive intrusion-tolerant server. Discussion

Alfonso Valdes; Magnus Almgren; Steven Cheung; Yves Deswarte; Bruno Dutertre; Joshua Levy; Hassen Saïdi; Victoria Stavridou; Tomás E. Uribe; Ernie Cohen; Ryoichi Sasaki; Roger M. Needham

Collaboration


Dive into the Ernie Cohen's collaboration.

Top Co-Authors

Avatar

Bruce Christianson

University of Hertfordshire

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

James G. Malcolm

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Hiroshi Yoshiura

University of Electro-Communications

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge