共 29 条
[1]
[Anonymous], 2012, COMPUTER AIDED VERIF, DOI DOI 10.1007/978-3-642-31424-7_55
[2]
Bagheri Hariri B., 2013, Proceedings of the 32Nd Symposium on Principles of Database Systems. PODS '13, P163, DOI [DOI 10.1145/2463664.2465221, 10.1145/2463664.2465221]
[4]
Bertrand N., 2015, 26 INT C CONC THEOR, V42, P44, DOI [10.4230/LIPICS.CONCUR.2015.44, DOI 10.4230/LIPICS.CONCUR.2015.44]
[5]
Bertrand Nathalie, 2012, RTA, P101, DOI DOI 10.4230/LIPICS.RTA.2012.101
[6]
A meta-notation for protocol analysis
[J].
PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP,
1999,
:55-69
[7]
Delzanno Giorgio, 2012, Formal Techniques for Distributed Systems. Joint 14th IFIP WG 6.1 International Conference, FMOODS 2012 and 32nd IFIP WG 6.1 International Conference, FORTE 2012, P235, DOI 10.1007/978-3-642-30793-5_15
[8]
Delzanno G., 2016, P 31 IT C COMP LOG M, P86
[10]
Reachability Predicates for Graph Assertions
[J].
REACHABILITY PROBLEMS, RP 2016,
2016, 9899
:63-76