共 50 条
- [42] Towards a completeness result for model checking of security protocols 11TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP - PROCEEDINGS, 1998, : 96 - 105
- [43] Model checking of security protocols with pre-configuration INFORMATION SECURITY APPLICATIONS, 2003, 2908 : 1 - 15
- [44] Model checking an entire Linux distribution for security violations 21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2005, : 8 - 17
- [45] Apply model checking to security analysis in trust management 2007 IEEE 23RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOP, VOLS 1-2, 2007, : 734 - 743
- [46] Detection of Security Vulnerabilities Using Guided Model Checking LOGIC PROGRAMMING, PROCEEDINGS, 2008, 5366 : 822 - 823
- [48] Analyzing Internet Routing Security Using Model Checking LOGIC FOR PROGRAMMING, ARTIFICIAL INTELLIGENCE, AND REASONING, (LPAR-20 2015), 2015, 9450 : 112 - 129
- [49] Model Checking the SET Purchasing Process Protocol with SPIN 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4486 - 4489
- [50] Analyzing Leader Election Protocol by Probabilistic Model Checking PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 564 - 567