The Guided System Development Framework: Modeling and Verifying Communication Systems
暂无分享,去创建一个
[1] E. Valovage. Enhanced ADS-B Research , 2007, IEEE Aerospace and Electronic Systems Magazine.
[2] Richard Barhydt,et al. Development of Intent Information Changes to Revised Minimum Aviation System Performance Standards for Automatic Dependent Surveillance Broadcast (RTCA/DO-242A) , 2002 .
[3] A.D. Lazarov,et al. Isar Signal Modeling and Image Reconstruction with Entropy Minimization Autofocussing , 2006, 2006 ieee/aiaa 25TH Digital Avionics Systems Conference.
[4] Dawn Xiaodong Song,et al. Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis , 2001, J. Comput. Secur..
[5] Mikael Buchholtz,et al. User ’ s Guide for the LySatool version 2 . 01 , 2005 .
[6] Peter B. Hirtle,et al. Authenticity in a Digital Environment. , 2000 .
[7] D. Hall,et al. Enhanced ADS-B research , 2006, 2006 IEEE Aerospace Conference.
[8] Nobuko Yoshida,et al. Structured Communication-Centred Programming for Web Services , 2007, ESOP.
[9] Andrew D. Gordon,et al. Verified Interoperable Implementations of Security Protocols , 2006, CSFW.
[10] Nikolaj Bjørner,et al. Z3: An Efficient SMT Solver , 2008, TACAS.
[11] Bruno Blanchet,et al. An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[12] Flemming Nielson,et al. Static validation of security protocols , 2005, J. Comput. Secur..
[13] P. Syverson,et al. A Unified Cryptographic Protocol Logic , 1996 .
[14] Juan Chen,et al. Secure distributed programming with value-dependent types , 2013, J. Funct. Program..
[15] Flemming Nielson,et al. Protocol Stacks for Services , 2009 .
[16] Bruno Blanchet,et al. From Computationally-proved Protocol Specifications to Implementations , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.
[17] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[18] Flemming Nielson,et al. On Building Secure Communication Systems , 2013 .
[19] P. Cogn,et al. A Computationally Sound Mechanized Prover for Security Protocols , 2009 .
[20] Dawn Xiaodong Song,et al. AGVI - Automatic Generation, Verification, and Implementation of Security Protocols , 2001, CAV.
[21] Sebastian Mödersheim,et al. The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols , 2009, FOSAD.
[22] Sebastian Mödersheim,et al. Algebraic Properties in Alice and Bob Notation , 2009, 2009 International Conference on Availability, Reliability and Security.
[23] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[24] Flemming Nielson,et al. The Succinct Solver Suite , 2004, TACAS.