Ernie Cohen
Telcordia Technologies
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ernie Cohen.
mathematics of program construction | 2000
Ernie Cohen
We present some new theorems that equate an iteration to a sequential composition of stronger iterations, and use these theorems to simplify and generalize a number of known techniques for pretending atomicity in concurrent programs.
ieee computer security foundations symposium | 2000
Ernie Cohen
We describe a proof method for cryptographic protocols, based on a strong secrecy invariant that catalogues conditions under which messages can be published. For typical protocols, a suitable first-order invariant can be generated automatically from the program text, independent of the properties being verified, allowing safety properties to be proved by ordinary first-order reasoning. We have implemented the method in an automatic verifier, TAPS, that proves safety properties roughly equivalent to those in published Isabelle verifications, but does so much faster (usually within a few seconds) and with little or no guidance from the user. We have used TAPS to analyze about 60 protocols, including all but three protocols from the Clark and Jacob survey; on average, these verifications each require less than 4 seconds of CPU time and less than 4 bytes of hints from the user.
ACM Transactions on Computational Logic | 2000
Ernie Cohen; Dexter Kozen
We provide a simpler alternative proof of the <italic>PSPACE</italic>-hardness of propositional Hoare logic (PHL).
computer aided verification | 2000
Ernie Cohen
We describe a proof method for cryptographic protocols, based on a strong secrecy invariant that catalogues conditions under which messages can be published. For typical protocols, a suitable first-order invariant can be generated automatically from the program text, independent of the properties being verified, allowing safety properties to be proved by ordinary first-order reasoning. We have implemented the method in an automatic verifier, TAPS, that proves safety properties roughly equivalent to those in published Isabelle verifications, but does so much faster (usually within a few seconds) and with little or no guidance from the user. We have used TAPS to analyze about 60 protocols, including all but three protocols from the Clark and Jacob survey; on average, these verifications each require less than 4 seconds of CPU time and less than 4 bytes of hints from the user.
Archive | 1996
Ernie Cohen; Dexter Kozen; Frederick Smith
international workshop on security | 2003
Hiroshi Yoshiura; Kunihiko Miyazaki; Shinji Itoh; Kazuo Takaragi; Ryoichi Sasaki; Ernie Cohen; Bruce Christianson; Richard Clayton; Pekka Nikander; Ross J. Anderson
international workshop on security | 2003
Giampaolo Bellal; Lawrence C. Paulson; Ernie Cohen; Bruce Christianson; Matt Blaze
international workshop on security | 2003
Wenbo Mao; Pekka Nikander; Virgil D. Gligor; Lawrence C. Paulson; Bruce Christianson; Ernie Cohen
Lecture Notes in Computer Science | 2003
Giampaolo Bella; Stefano Bistarelli; Ernie Cohen; James G. Malcolm
Lecture Notes in Computer Science | 2003
Alfonso Valdes; Magnus Almgren; Steven Cheung; Yves Deswarte; Bruno Dutertre; Joshua Levy; Hassen Saïdi; Victoria Stavridou; Tomás E. Uribe; Ernie Cohen; Ryoichi Sasaki; Roger M. Needham