共 16 条
- [2] Amnell Tobias, 2001, WORKSH SPEC IMPL VAL
- [3] [Anonymous], NEW TECHN DISTR SYST
- [4] Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
- [5] An efficient cryptographic protocol verifier based on prolog rules [J]. 14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, : 82 - 96
- [6] Dan L, 2010, IEEE INT C ENG COMP, P349, DOI [10.1109/ICECCS.2010.47, 10.1109/ICECCS.2010.55]
- [7] Ibrahim Ibrahim M., 2007, 2007 3rd International Symposium on Information Assurance and Security, P21
- [8] Jurjens J., 2002, "UML" 2002 - Unified Modeling Language. Model Engineering, Concepts, and Tools. 5th International Conference. Proceedings (Lecture Notes in Computer Science Vol.2460), P412
- [9] Kaliappan Prabhu Shankar, 2008, 2008 International Conference on Computer Science and Software Engineering (CSSE 2008), P227, DOI 10.1109/CSSE.2008.976
- [10] Lodderstedt Torsten., 2002, UML 02 P 5 INT C UNI, P426, DOI DOI 10.1007/3-540-45800-X_33