Developing User Strategies in PVS: A Tutorial
暂无分享,去创建一个
[1] Ben L. Di Vito. A PVS Prover Strategy Package for Common Manipulations , 2002 .
[2] Myla Archer. Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME , 2002 .
[3] Elvinia Riccobene,et al. Proving Invariants of I/O Automata with TAME , 2004, Automated Software Engineering.
[4] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[5] Frits W. Vaandrager,et al. Verification of a Leader Election Protocol: Formal Methods Applied to IEEE 1394 , 2000, Formal Methods Syst. Des..
[6] Myla Archer,et al. TAME: Using PVS strategies for special-purpose theorem proving , 2001, Annals of Mathematics and Artificial Intelligence.
[7] Dennis M. Bushnell,et al. Real automation in the field , 2001 .