Provably correct Java implementations of Spi Calculus security protocols specifications

被引:0
|
作者
Politecnico di Torino, Dip. di Automatica e Informatica, c.so Duca degli Abruzzi 24, I-10129 Torino, Italy [1 ]
机构
来源
Comput Secur | / 3卷 / 302-314期
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Software design
引用
收藏
相关论文
共 50 条
  • [21] From finite state machines to provably correct Java']Java card applets
    Hubbers, E
    Oostdijk, M
    Poll, E
    [J]. SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 : 465 - 470
  • [22] Provably correct inline monitoring for multithreaded Java']Java-like programs
    Dam, Mads
    Jacobs, Bart
    Lundblad, Andreas
    Piessens, Frank
    [J]. JOURNAL OF COMPUTER SECURITY, 2010, 18 (01) : 37 - 59
  • [23] Verified Interoperable Implementations of Security Protocols
    Bhargavan, Karthikeyan
    Fournet, Cedric
    Gordon, Andrew D.
    Tse, Stephen
    [J]. ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2008, 31 (01):
  • [24] Verifying Implementations of Security Protocols by Refinement
    Polikarpova, Nadia
    Moskal, Michal
    [J]. VERIFIED SOFTWARE: THEORIES, TOOLS, EXPERIMENTS, 2012, 7152 : 50 - +
  • [26] A 5-step hunt for faults in Java']Java implementations of algebraic specifications
    Nunes, Isabel
    Luis, Filipe
    [J]. IEEE SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW 2013), 2013, : 168 - 177
  • [27] Provably correct control flow graphs from Java']Java bytecode programs with exceptions
    Amighi, Afshin
    Gomes, Pedro de Carvalho
    Gurov, Dilian
    Huisman, Marieke
    [J]. INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2016, 18 (06) : 653 - 684
  • [28] Control flow analysis of cryptography protocols based on Spi calculus
    Wang, Quanlai
    Wang, Yadi
    Han, Jihong
    [J]. Jisuanji Gongcheng/Computer Engineering, 2006, 32 (15): : 137 - 139
  • [29] From finite state machines to provably correct java card applets
    Hubbers, Engelbert
    Oostdijk, Martijn
    Poll, Erik
    [J]. IFIP Advances in Information and Communication Technology, (465-470):
  • [30] PV2JAVA']JAVA: Automatic Generator of Security Protocol Implementations Written in Java']Java Language from the Applied PI Calculus Proved in the Symbolic Model
    Meng, Bo
    Yang, Yitong
    Zhang, Jinli
    Lu, Jintian
    Wang, Dejun
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (11): : 211 - 228