共 40 条
[1]
Allamigeon X, 2006, LECT NOTES COMPUT SC, V4134, P35
[2]
Ball T, 2004, LECT NOTES COMPUT SC, V2988, P388
[4]
An efficient cryptographic protocol verifier based on prolog rules
[J].
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2001,
:82-96
[5]
A computationally sound mechanized prover for security protocols
[J].
2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2006,
:140-154
[6]
Improving computer security using extended static checking
[J].
2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2002,
:160-173
[7]
MODEL CHECKING AND ABSTRACTION
[J].
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS,
1994, 16 (05)
:1512-1542
[8]
AUTOMATIC VERIFICATION OF FINITE-STATE CONCURRENT SYSTEMS USING TEMPORAL LOGIC SPECIFICATIONS
[J].
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS,
1986, 8 (02)
:244-263
[9]
Clarke EM, 1999, MODEL CHECKING, P1