共 50 条
- [32] Workstation and network needs for very large PACS implementations PACS DESIGN AND EVALUATION: ENGINEERING AND CLINICAL ISSUES - MEDICAL IMAGING 1997, 1997, 3035 : 291 - 298
- [34] Checking Contact Tracing App Implementations ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 133 - 144
- [36] Proving Functional Equivalence of two AES Implementations using Bounded Model Checking SECOND INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION, AND VALIDATION, PROCEEDINGS, 2009, : 31 - 40
- [37] Model Checking Social Network Models ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2017, (256): : 238 - 252
- [38] Slede: Framework for Automatic Verification of Sensor Network Security Protocol Implementations 2009 31ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, COMPANION VOLUME, 2009, : 427 - 428
- [39] Analysing Protocol Implementations INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2009, 5451 : 171 - 182
- [40] Model Checking the SET Purchasing Process Protocol with SPIN 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4486 - 4489