Using the ASTRAL model checker to analyze Mobile IP
暂无分享,去创建一个
[1] Miss A.O. Penney. (b) , 1974, The New Yale Book of Quotations.
[2] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[3] Natsume Matsuzaki,et al. Key Distribution Protocol for Digital Mobile Communication Systems , 1989, CRYPTO.
[4] L.M. PATNAIK,et al. Specification of Real-Time Systems , 1993, Int. J. Softw. Eng. Knowl. Eng..
[5] Richard A. Kemmerer,et al. A Formal Framework for ASTRAL Intralevel Proof Obligations , 1994, IEEE Trans. Software Eng..
[6] Jan van Katwijk,et al. Hybrid specification of control systems , 1995, Proceedings of First IEEE International Conference on Engineering of Complex Computer Systems. ICECCS'95.
[7] Charles E. Perkins,et al. IP Mobility Support , 1996, RFC.
[8] John Ulrich,et al. Automated Analysis of Cryptographic Protocols Using Mur ' , 1997 .
[9] A. W. Roscoe,et al. Using CSP to Detect Errors in the TMN Protocol , 1997, IEEE Trans. Software Eng..
[10] John C. Mitchell,et al. Automated analysis of cryptographic protocols using Mur/spl phi/ , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[11] Zhe Dang,et al. Using the ASTRAL Model Checker for Cryptographic Protocol Analysis , 1997 .
[12] Gruia-Catalin Roman,et al. Modeling mobile IP in mobile UNITY , 1999, TSEM.
[13] Zhe Dang,et al. The design and analysis of real-time systems using the ASTRAL software development environment , 1999, Ann. Softw. Eng..