Structuring and Visualising an IC-card Security Standard
暂无分享,去创建一个
[1] Larry L. Peterson,et al. A language-based approach to protocol implementation , 1992, SIGCOMM '92.
[2] James R. McGraw,et al. The VAL Language: Description and Analysis , 1982, TOPL.
[3] Pieter Hartel,et al. Towards testability in smart card operating system design , 1994 .
[4] Gregor von Bochmann,et al. Some Comments on "Transition-Oriented" Versus "Structured" Specification of Distributed Algorithms and Protocols , 1987, IEEE Trans. Software Eng..
[5] Philip T. Cox,et al. Prograph: a step towards liberating programming from textual conditioning , 1989, [Proceedings] 1989 IEEE Workshop on Visual Languages.
[6] M. Stella Atkins. Experiments in SR with different upcall program structures , 1988, TOCS.
[7] Larry L. Peterson,et al. A language-based approach to protocol implementation , 1993, TNET.
[8] Arthur H. Veen,et al. Dataflow machine architecture , 1986, CSUR.
[9] Jonathan Billington,et al. PROTEAN: A High-Level Petri Net Tool for the Specification and Verification of Communication Protocols , 1988, IEEE Trans. Software Eng..
[10] Yechiam Yemini,et al. NEST: a network simulation and prototyping testbed , 1990, CACM.
[11] V E Henderson,et al. On Standardization. , 1922, Canadian Medical Association journal.
[12] Gerard Tel,et al. Topics in distributed algorithms , 1991 .
[13] Gerard J. Holzmann,et al. Automated Protocol Validation in Argos: Assertion Proving and Scatter Searching , 1987, IEEE Transactions on Software Engineering.
[14] Jonathan K. Millen,et al. The Interrogator: Protocol Secuity Analysis , 1987, IEEE Transactions on Software Engineering.
[15] Susan Stepney,et al. High integrity compilation - a case study , 1993 .