Using formal methods to cultivate trust in smart card operating systems
暂无分享,去创建一个
[1] Pieter H. Hartel,et al. Visualising the structure of an IC-card security architecture , 1995 .
[2] Philip T. Cox,et al. Prograph: a step towards liberating programming from textual conditioning , 1989, [Proceedings] 1989 IEEE Workshop on Visual Languages.
[3] Andrew S. Tanenbaum,et al. Structured computer organization; (2nd ed.) , 1984 .
[4] Roland Sauerbrey,et al. Biography , 1992, Ann. Pure Appl. Log..
[5] Susan Stepney,et al. High integrity compilation - a case study , 1993 .
[6] Liwu Li,et al. The Java Language , 1998 .
[7] J. D. Tygar,et al. WWW electronic commerce and java trojan horses , 1996 .
[8] V E Henderson,et al. On Standardization. , 1922, Canadian Medical Association journal.
[9] D. A. Turner,et al. Miranda: A Non-Strict Functional language with Polymorphic Types , 1985, FPCA.
[10] Guy L. Steele,et al. The Java Language Specification , 1996 .
[11] James A. Gosling,et al. The java language environment: a white paper , 1995 .
[12] Pieter Hartel,et al. Towards testability in smart card operating system design , 1994 .
[13] Flemming Nielson,et al. Semantics with applications - a formal introduction , 1992, Wiley professional computing.