暂无分享,去创建一个
[1] Jean Goubault-Larrecq,et al. Finite models for formal security proofs , 2010, J. Comput. Secur..
[2] Parosh Aziz Abdulla,et al. Regular Tree Model Checking , 2002, CAV.
[3] Peter Selinger. Models for an adversary-centric protocol logic , 2001, Electron. Notes Theor. Comput. Sci..
[4] Christoph Weidenbach,et al. Towards an Automatic Analysis of Security Protocols in First-Order Logic , 1999, CADE.
[5] Parosh Aziz Abdulla,et al. Monotonic Abstraction: on Efficient Verification of Parameterized Systems , 2009, Int. J. Found. Comput. Sci..
[6] Ahmed Bouajjani,et al. Abstract regular (tree) model checking , 2012, International Journal on Software Tools for Technology Transfer.
[7] Hubert Comon-Lundh,et al. Inductionless Induction , 2001, Handbook of Automated Reasoning.
[8] Alexei Lisitsa. Finite Models vs Tree Automata in Safety Verification , 2012, RTA.
[9] Jan Jürjens,et al. Finite Models in FOL-Based Crypto-Protocol Verification , 2009, ARSPA-WITS.
[10] Alexei Lisitsa,et al. Reachability as Derivability, Finite Countermodels and Verification , 2010, ATVA.
[11] J. Kruskal. Well-quasi-ordering, the Tree Theorem, and Vazsonyi’s conjecture , 1960 .
[12] Parosh Aziz Abdulla,et al. Verifying Programs with Unreliable Channels , 1996, Inf. Comput..
[13] Parosh Aziz Abdulla,et al. A Survey of Regular Model Checking , 2004, CONCUR.
[14] Parosh Aziz Abdulla,et al. Parameterized Tree Systems , 2008, FORTE.
[15] Alexei Lisitsa. Finite countermodels as invariants. A case study in verification of parameterized mutual exclusion protocol , 2010, WING@ETAPS/IJCAR.
[16] Marcus Nilsson,et al. Regular Model Checking , 2000, CAV.
[17] Joshua D. Guttman. Security Theorems via Model Theory , 2009, EXPRESS.
[18] Deepak Kapur,et al. Proof by Consistency , 1987, Artif. Intell..
[19] A. Lisitsa. Reachability as deducibility , finite countermodels and verification , 2009 .
[20] Alexei Lisitsa. Finite Model Finding for Parameterized Verification , 2010, ArXiv.
[21] Alexander Leitsch,et al. Automated Model Building , 2010 .