State Machines
暂无分享,去创建一个
[1] Charles R. Kime,et al. Logic and Computer Design Fundamentals , 1997 .
[2] Christopher R. Clare. Designing logic systems using state machines , 1973 .
[3] M. F.,et al. Bibliography , 1985, Experimental Gerontology.
[4] Randy H. Katz,et al. Contemporary Logic Design , 2004 .
[5] Alexander Aiken,et al. A theory of type qualifiers , 1999, PLDI '99.
[6] Kimberly Ryan,et al. Cadence Design Systems Inc. , 1993 .
[7] Eugenio Moggi,et al. Notions of Computation and Monads , 1991, Inf. Comput..
[8] Andrew C. Myers,et al. Robust declassification , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[9] Trent Jaeger,et al. Using CQUAL for Static Analysis of Authorization Hook Placement , 2002, USENIX Security Symposium.
[10] Dennis M. Volpano. Safety versus Secrecy , 1999, SAS.
[11] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[12] Alfred V. Aho,et al. Compilers: Principles, Techniques, and Tools , 1986, Addison-Wesley series in computer science / World student series edition.
[13] Luca Cardelli,et al. Secrecy and Group Creation , 2000, CONCUR.
[14] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[15] Jeffrey D. Ullman,et al. Introduction to Automata Theory, Languages and Computation , 1979 .
[16] Martín Abadi,et al. A core calculus of dependency , 1999, POPL '99.
[17] David Thomas,et al. The Pragmatic Programmer: From Journeyman to Master , 1999 .
[18] Derick Wood,et al. Theory of computation , 1986 .
[19] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[20] David A. Wagner,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Detecting Format String Vulnerabilities with Type Qualifiers , 2001 .
[21] Axel Jantsch,et al. Modeling embedded systems and SoCs - concurrency and time in models of computation , 2003, The Morgan Kaufmann series in systems on silicon.
[22] Peter M. Broadwell,et al. Scrash: A System for Generating Secure Crash Information , 2003, USENIX Security Symposium.
[23] Jon G. Riecke,et al. The SLam calculus: programming with secrecy and integrity , 1998, POPL '98.