共 50 条
- [41] Alice and Bob: Reconciling Formal Models and Implementation [J]. PROGRAMMING LANGUAGES WITH APPLICATIONS TO BIOLOGY AND SECURITY: ESSAYS DEDICATED TO PIERPAOLO DEGANO ON THE OCCASION OF HIS 65TH BIRTHDAY, 2015, 9465 : 66 - 85
- [44] Can Alice and Bob Guarantee Output to Carol? [J]. ADVANCES IN CRYPTOLOGY, PT V, EUROCRYPT 2024, 2024, 14655 : 32 - 61
- [45] Experience report: How to extract security protocols' specifications from C libraries [J]. 2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2018), VOL 2, 2018, : 719 - 724
- [46] Modeling and analysis of security protocols using role based specifications and Petri nets [J]. APPLICATIONS AND THEORY OF PETRI NETS, 2008, 5062 : 72 - +
- [48] THE SEMANTICS OF SHARED SUBMODULES SPECIFICATIONS [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1985, 185 : 359 - 373
- [49] Refining the Semantics of Epistemic Specifications [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2021, (345): : 113 - 126
- [50] RELATIONAL SPECIFICATIONS AND OBSERVATIONAL SEMANTICS [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1986, 233 : 209 - 217