共 50 条
- [21] From finite state machines to provably correct Java']Java card applets [J]. SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 : 465 - 470
- [23] Verified Interoperable Implementations of Security Protocols [J]. ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2008, 31 (01):
- [24] Verifying Implementations of Security Protocols by Refinement [J]. VERIFIED SOFTWARE: THEORIES, TOOLS, EXPERIMENTS, 2012, 7152 : 50 - +
- [25] Automatic generation of security protocol implementations written in java from abstract specifications proved in the computational model [J]. Meng, Bo (mengscuec@gmail.com), 1600, Femto Technique Co., Ltd. (19):
- [26] A 5-step hunt for faults in Java']Java implementations of algebraic specifications [J]. IEEE SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW 2013), 2013, : 168 - 177
- [28] Control flow analysis of cryptography protocols based on Spi calculus [J]. Jisuanji Gongcheng/Computer Engineering, 2006, 32 (15): : 137 - 139
- [29] From finite state machines to provably correct java card applets [J]. IFIP Advances in Information and Communication Technology, (465-470):
- [30] PV2JAVA']JAVA: Automatic Generator of Security Protocol Implementations Written in Java']Java Language from the Applied PI Calculus Proved in the Symbolic Model [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (11): : 211 - 228