共 50 条
- [31] Security Analysis on InfiniBand Protocol Implementations [J]. PROCEEDINGS OF 2016 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2016,
- [32] Formal Verification of Security Specifications with Common Criteria [J]. APPLIED COMPUTING 2007, VOL 1 AND 2, 2007, : 1506 - +
- [33] A Model-based Approach to Security Flaw Detection of Network Protocol Implementations [J]. 16TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS: ICNP'08, 2008, : 114 - 123
- [34] PROTOCOL TRACE ANALYSIS BASED ON FORMAL SPECIFICATIONS [J]. IFIP TRANSACTIONS C-COMMUNICATION SYSTEMS, 1992, 2 : 393 - 408
- [35] Complementing computational protocol analysis with formal specifications [J]. FORMAL ASPECTS IN SECURITY AND TRUST, 2005, 173 : 129 - 144
- [36] From protocol specifications to flaws and attack scenarios: An automatic and formal algorithm [J]. SIXTH IEEE WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 1997, : 256 - 261
- [37] Formal verification of abstract system and protocol specifications [J]. 30TH ANNUAL IEEE/NASA SOFTWARE ENGINEERING WORKSHOP, PROCEEDINGS, 2006, : 207 - +
- [39] Which widgets? Transforming formal user-interface specifications to implementations [J]. PROCEEDINGS OF THE 21ST AUSTRALASIAN COMPUTER SCIENCE CONFERENCE, ACSC'98, 1998, 20 (01): : 295 - 306
- [40] An Innovative Teaching Tool for the Verification of Abstract Data Type Implementations from Formal Algebraic Specifications [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE, ICCS 2012, 2012, 9 : 1743 - 1752