共 50 条
- [2] Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project Electron. Notes Theor. Comput. Sci., 1 (123-136):
- [3] Hardware/software security co-verification and vulnerability detection: An information flow perspective Integration, 2024, 94
- [4] Experimental analysis and implementation of bit level permutation instructions for embedded security 2013, World Scientific and Engineering Academy and Society, Ag. Ioannou Theologou 17-23, Zographou, Athens, 15773, Greece (10):
- [5] KEY MANAGEMENT SCHEME FOR END-TO-END ENCRYPTION AND A FORMAL VERIFICATION OF ITS SECURITY. Systems, computers, controls, 1982, 13 (03): : 59 - 69
- [10] Verification games: Making verification fun Proceedings for FTfJP 2012: The 14th Workshop on Formal Techniques for Java-Like Programs - Co-located with ECOOP 2012 and PLDI 2012, Papers Presented at the Workshop, 2012, : 42 - 49