VERIFYING THE SEMANTIC CORRECTNESS OF PROTOCOLS USING THE COHERENCE PROPERTY

被引:0
|
作者
KARPOV, YG
BORSHCHEV, AV
MESHCHERSKY, AA
机构
来源
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
引用
收藏
页码:41 / 44
页数:4
相关论文
共 50 条
  • [21] Modeling and Verifying Security Protocols Using UML 2
    Smith, Sandra
    Beaulieu, Alain
    Phillips, W. Greg
    2011 IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON 2011), 2011, : 72 - 79
  • [22] Is semantic correctness descriptive?
    Honkasalo, Aleksi
    THEORIA-A SWEDISH JOURNAL OF PHILOSOPHY, 2022, 88 (05): : 899 - 907
  • [23] Specifying and Verifying the Correctness of Dynamic Software Updates
    Hayden, Christopher M.
    Magill, Stephen
    Hicks, Michael
    Foster, Nate
    Foster, Jeffrey S.
    VERIFIED SOFTWARE: THEORIES, TOOLS, EXPERIMENTS, 2012, 7152 : 278 - +
  • [24] Verifying the correctness of parallel logical control algorithms
    Zakrevskii, A.D.
    Programming and computer software, 1988, 13 (05): : 218 - 221
  • [25] Verifying Functional Correctness of C Programs with VCC
    Moskal, Michal
    NASA FORMAL METHODS, 2011, 6617 : 56 - 57
  • [26] Mechanically verifying the correctness of an offline partial evaluator
    Hatcliff, J
    PROGRAMMING LANGUAGES: IMPLEMENTATIONS, LOGICS AND PROGRAMS, 1995, 982 : 279 - 298
  • [27] VERIFYING THE CORRECTNESS OF PARALLEL LOGICAL CONTROL ALGORITHMS
    ZAKREVSKII, AD
    PROGRAMMING AND COMPUTER SOFTWARE, 1987, 13 (05) : 218 - 221
  • [28] Verifying correctness of interfaces of design models of manufacturing systems using functional abstractions
    Zurawski, R
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 1997, 44 (03) : 307 - 320
  • [29] Towards Verifying Correctness of Wireless Sensor Network Applications Using Insense and Spin
    Sharma, Oliver
    Lewis, Jonathan
    Miller, Alice
    Dearle, Al
    Balasubramaniam, Dharini
    Morrison, Ron
    Sventek, Joe
    MODEL CHECKING SOFTWARE, 2009, 5578 : 223 - +
  • [30] What is Correctness of Security Protocols?
    Bella, Giampaolo
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2008, 14 (12) : 2083 - 2106