Weak bisimulation for probabilistic timed automata and applications to security
暂无分享,去创建一个
Andrea Maggiolo-Schettini | Ruggero Lanotte | Angelo Troina | A. Maggiolo-Schettini | R. Lanotte | Angelo Troina
[1] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[2] Rajeev Alur,et al. A Theory of Timed Automata , 1994, Theor. Comput. Sci..
[3] Bernhard Steffen,et al. Reactive, generative, and stratified models of probabilistic processes , 1990, [1990] Proceedings. Fifth Annual IEEE Symposium on Logic in Computer Science.
[4] Thomas A. Henzinger,et al. Symbolic Model Checking for Real-Time Systems , 1994, Inf. Comput..
[5] Roberto Gorrieri,et al. Security Analysis of a Probabilistic Non-repudiation Protocol , 2002, PAPM-PROBMIV.
[6] R. Segala,et al. Automatic Verification of Real-Time Systems with Discrete Probability Distributions , 1999, ARTS.
[7] Robin Milner,et al. Communication and concurrency , 1989, PHI Series in computer science.
[8] Marta Z. Kwiatkowska,et al. Automatic verification of real-time systems with discrete probability distributions , 1999, Theor. Comput. Sci..
[9] Richard S. Varga,et al. Proof of Theorem 5 , 1983 .
[10] Christel Baier,et al. Weak Bisimulation for Fully Probabilistic Processes , 1997, FBT.
[11] Danièle Beauquier. On probabilistic timed automata , 2003, Theor. Comput. Sci..
[12] Patricia Bouyer,et al. Timed Automata May Cause Some Troubles , 2002 .
[13] Marta Kwiatkowska,et al. Symbolic Model Checking of Probabilistic Timed Automata Using Backwards Reachability , 2000 .
[14] Olivier Markowitch,et al. Probabilistic Non-Repudiation without Trusted Third Party , 1999 .