共 12 条
[1]
Model checking for E-business control and assurance
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS,
2005, 35 (03)
:445-450
[3]
CHAUM D, 1989, P CRYPT 88, P319
[4]
Cox B, 1995, PROCEEDINGS OF THE FIRST USENIX WORKSHOP OF ELECTRONIC COMMERCE, P77
[5]
Heintze N, 1996, PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, P147
[6]
LOWE G, 1996, P 2 INT WORKSH TOOLS, P147
[7]
Failure analysis of an E-commerce protocol using model checking
[J].
WECWIS 2000: SECOND INTERNATIONAL WORKSHOP ON ADVANCED ISSUES OF E-COMMERCE AND WEB-BASED INFORMATION SYSTEMS, PROCEEDING,
2000,
:176-183
[8]
RAY I, 2000, P 14 ANN IFIP WG 11
[9]
ROSCOE AW, 1995, P IEEE S SECUR PRIV, P114, DOI 10.1109/SECPRI.1995.398927
[10]
Schuldt H, 2000, LECT NOTES COMPUT SC, V1773, P193