The SH-Verification Tool
暂无分享,去创建一个
[1] Gülüm Basak. Sicherheitsanalyse von Authentifizierungsprotokollen - model checking mit dem SH-Verification Tool , 1999, GMD research series.
[2] Carsten Rudolph,et al. Analyse kryptographischer Protokolle mittels Produktnetzen basierend auf Modellannahmen der BAN-Logik , 1998, GMD research series.
[3] Ulrich Ultes-Nitsche,et al. Verification by Behaviour Abstraction - A Case Study of Service Interaction Detection in Intelligent Telephone Networks , 1996, CAV.
[4] Ulrich Ultes-Nitsche,et al. The SH-Verification Tool — Abstraction-Based Verification of Co-operating Systems , 1998, Formal Aspects of Computing.
[5] Roland Rieke,et al. Verification of Cooperating Systems - An Approach Based on Formal Languages , 2000, FLAIRS Conference.
[6] Rance Cleaveland,et al. The concurrency workbench: a semantics-based tool for the verification of concurrent systems , 1993, TOPL.
[7] Rainer Prinoth,et al. Modellierung verteilter Systeme - Konzeption, formale Spezifikation und Verifikation mit Produktnetzen , 1995 .
[8] Peter Henderson,et al. Questions and Answers About Ten Formal Methods , 1999 .
[9] Rainer Prinoth,et al. Formale Spezifikation und dynamische Analyse verteilter Systeme mit Produktionsnetzen , 1993, Kommunikation in Verteilten Systemen.
[10] Peter Ochsenschläger,et al. Case Study: Service Interaction Detection by Formal Verification under Behaviour Abstraction , 1996 .
[11] C. Grundmann. Humboldt‐Universität Berlin , 1950 .
[12] Colin Stirling,et al. An Introduction to Modal and Temporal Logics for CCS , 1991, Concurrency: Theory, Language, And Architecture.