共 50 条
- [31] Proving concurrent constraint programs correct ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1997, 19 (05): : 685 - 725
- [35] A formal method for proving programs correct 2001 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-5: E-SYSTEMS AND E-MAN FOR CYBERNETICS IN CYBERSPACE, 2002, : 718 - 723
- [36] Structural control operators for composing diagrams of strand spaces of concurrent cryptographic protocols WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 1726 - 1730
- [37] The security analysis for ad hoc routing protocols based on improved strand space 2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 585 - +
- [38] A Short Introduction to Two Approaches in Formal Verification of Security Protocols: Model Checking and Theorem Proving ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 8 (01): : 3 - 24
- [40] A comparison between strand spaces and multiset rewriting for security protocol analysis SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 356 - 383