共 45 条
- [1] Abdulla P.A., Annichini A., Bensalem S., Bouajjani A., Habermehl P., Lakhnech Y., Verification of infinite-state systems by combining abstraction and reachability, Proc. CAV'99. LNCS 111, (1999)
- [2] Abadi M., Gordon A., A calculus for cryptographic protocols: The spi calculus, Inf. Comput, 148, 1, pp. 1-70, (1999)
- [3] Amadio R., An asynchronous model of locality, failure process mobility, Proc. Coordination'97. LNCS 1282, (1997)
- [4] Boreale M., de Nicola R., Pugliese R., Proof Techniques for Cryptographic Processes, Proc. LICS'99
- [5] Boreale M., On the Expressiveness of Internal Mobility in Name-Passing Calculi, TCS, 195, 2, pp. 205-226, (1998)
- [6] Bryant R.E., Symbolic manipulation of Boolean functions using a graphical representation, In: Proc. 22nd Design Automation Conference, pp. 688-694, (1994)
- [7] Boreale M., Sangiorgi D., Bisimulation in name-passing calculi without matching, Proc. LICS'98
- [8] Cardelli L., Abstractions for Mobile Computations, Secure Internet Programming: Security Issues For Mobile and Distributed Objects. LNCS 1603, (1999)
- [9] Caucal D., Graphes canoniques de graphes algébriques, Inf. Théor. Appl. (RAIRO), 24, 4, pp. 339-352, (1990)
- [10] Cardelli L., Gordon A., Mobile Ambients, Proc. FOS-SACS'98. LNCS 1378, (1998)