Applying a Dependency Mechanism for Voting Protocol Models Using Event-B
暂无分享,去创建一个
[1] John McCarthy,et al. Notes on Formalizing Context , 1993, IJCAI.
[2] Vanessa Teague,et al. A review of E-voting: the past, present and future , 2016, Ann. des Télécommunications.
[3] William Yurcik,et al. Threat Modeling as a Basis for Security Requirements , 2005 .
[4] Richard Dapoigny,et al. Modeling Contexts with Dependent Types , 2010, Fundam. Informaticae.
[5] Leslie Lamport,et al. The temporal logic of actions , 1994, TOPL.
[6] Dominique Méry,et al. Towards an integrated formal method for verification of liveness properties in distributed systems: with application to population protocols , 2017, Software & Systems Modeling.
[7] Andreas Fürst,et al. Event-B patterns and their tool support , 2009, 2009 Seventh IEEE International Conference on Software Engineering and Formal Methods.
[8] Dominique Méry,et al. Proof-Based Design of Security Protocols , 2010, CSR.
[9] Nazim Benassa. Modelling Attacker's Knowledge for Cascade Cryptographic Protocols , 2008, ABZ.
[10] Mark Ryan,et al. Analysis of an Electronic Voting Protocol in the Applied Pi Calculus , 2005, ESOP.
[11] Jean-Raymond Abrial,et al. Modeling in event-b - system and software engineering by Jean-Raymond Abrial , 2010, SOEN.
[12] Jon Barwise,et al. On Conditionals: CONDITIONALS AND CONDITIONAL INFORMATION , 1986 .
[13] Véronique Cortier,et al. A generic construction for voting correctness at minimum cost - Application to Helios , 2013, IACR Cryptol. ePrint Arch..
[14] J. Paul Gibson,et al. Feature Interactions in a Software Product Line for E-voting , 2009, ICFI.
[15] Lichun Chiang,et al. Trust and security in the e-voting system , 2009, Electron. Gov. an Int. J..
[16] Dines Bjørner,et al. Software Engineering 3 - Domains, Requirements, and Software Design , 2006, Texts in Theoretical Computer Science. An EATCS Series.
[17] Simon L. Peyton Jones,et al. Roadmap for enhanced languages and methods to aid verification , 2006, GPCE '06.