共 50 条
- [21] DY☆: A Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code [J]. 2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2021), 2021, : 523 - 542
- [22] Symbolic verification of lossy channel systems: Application to the bounded retransmission protocol [J]. TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, 1999, 1579 : 208 - 222
- [24] Efficient combinational verification using BDDs and a hash table [J]. ISCAS '97 - PROCEEDINGS OF 1997 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS I - IV: CIRCUITS AND SYSTEMS IN THE INFORMATION AGE, 1997, : 1025 - 1028
- [25] Rule-based Verification of Network Protocol Implementations using Symbolic Execution [J]. 2011 20TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2011,
- [26] Symbolic language representations for parametric verification of the revised capability exchange signalling protocol [J]. EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2007, : 480 - +
- [27] First-Order Timed Runtime Verification Using BDDs [J]. AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS (ATVA 2020), 2020, 12302 : 3 - 24
- [29] BOOLEAN MANIPULATION WITH FREE BDDS - AN APPLICATION IN COMBINATIONAL LOGIC VERIFICATION [J]. INFORMATION PROCESSING '94, VOL I: TECHNOLOGY AND FOUNDATIONS, 1994, 51 : 309 - 314
- [30] HARDWARE-VERIFICATION USING FIRST-ORDER BDDS [J]. COMPUTER HARDWARE DESCRIPTION LANGUAGES AND THEIR APPLICATIONS, 1993, 32 : 45 - 62