共 26 条
[1]
Bicakci K., Baykal N., One-time passwords: Security analysis using BAN logic and integrating with smartcard authentication, Lecture Notes in Computer Science, 2869, pp. 794-801, (2003)
[2]
Uyay M.U., Fecko M.A., Sethi A.S., Amer P.D., Testing protocols modeled as FSMs with timing parameters, Computer Networks, 31, pp. 1967-1988, (1999)
[3]
Lee D., Sabnani K.K., Kristol D.M., Paul S., Conformance testing of protocols specified as communicating FSMs, INFOCOM '93, 31, 18, (1999)
[4]
Murata T., Petri nets: Properties, analysis, and applications, Proceedings of IEEE, 77, 4, (1989)
[5]
Petri C.A., Communication with automata, New York: Griffiss Air Force Base, 1, SUPPL.1, (1966)
[6]
Peterson J.L., Petri net theory and the modeling of systems, Prentice-Hall International, (1981)
[7]
Ortiz E.L., Canonical polynomials in the Lanczos tau-method, Studies in Numerical Analysis, pp. 73-93, (1974)
[8]
Guo Y.B., Xi J.Q., Tang D.Y., Li X.M., Flexible transactional process model via CPN, Journal of Computational Information Systems, 4, pp. 725-730, (2008)
[9]
King A., Lu L.-J., A backward analysis for constraint logic programs, Theory and Practice of Logic Programming, 2, 4-5, pp. 517-547, (2002)
[10]
CPN tools homepage