共 50 条
- [1] Model checking security pattern compositions USIC 2007: PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, 2007, : 80 - 89
- [2] Automated Verification of Accountability in Security Protocols 2019 IEEE 32ND COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2019), 2019, : 397 - 413
- [3] Challenges in the automated verification of security protocols AUTOMATED REASONING, PROCEEDINGS, 2008, 5195 : 396 - 409
- [4] Automated verification of selected equivalences for security protocols LICS 2005: 20TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE - PROCEEDINGS, 2005, : 331 - 340
- [5] Automated verification of UMLsec models for security requirements UML 2004 - THE UNIFIED MODELING LANGUAGE: MODELING LANGUAGES AND APPLICATIONS, PROCEEDINGS, 2004, 3273 : 365 - 379
- [6] Automated verification of security policies in mobile code INTEGRATED FORMAL METHODS, PROCEEDINGS, 2007, 4591 : 37 - 53
- [7] Automated verification of selected equivalences for security protocols JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2008, 75 (01): : 3 - 51
- [9] Automated Game-Theoretic Verification of Security Systems QUANTITATIVE EVALUATION OF SYSTEMS (QEST 2019), 2019, 11785 : 239 - 256