VERIFYING THE SEMANTIC CORRECTNESS OF PROTOCOLS USING THE COHERENCE PROPERTY

被引:0
|
作者
KARPOV, YG
BORSHCHEV, AV
MESHCHERSKY, AA
机构
来源
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
引用
收藏
页码:41 / 44
页数:4
相关论文
共 50 条
  • [31] Secrecy correctness for security protocols
    Adi, K
    Pene, L
    DFMA '05: FIRST INTERNATIONAL CONFERENCE ON DISTRIBUTED FRAMEWORKS FOR MULTIMEDIA APPLICATIONS, PROCEEDINGS, 2004, : 22 - 29
  • [32] Using prediction to accelerate coherence protocols
    Mukherjee, SS
    Hill, MD
    25TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE, PROCEEDINGS, 1998, : 179 - 190
  • [33] Verifying norm compliancy of protocols
    Aldewereld, Huib
    Vazquez-Salceda, Javier
    Dignum, Frank
    Meyer, John-Jules Ch.
    COORDINATION, ORGANIZATIONS, INSTITUTIONS, AND NORMS IN MULTI-AGENT SYSTEMS, 2006, 3913 : 231 - 245
  • [34] The complexity of verifying population protocols
    Javier Esparza
    Stefan Jaax
    Mikhail Raskin
    Chana Weil-Kennedy
    Distributed Computing, 2021, 34 : 133 - 177
  • [35] Verifying Communication Protocols Using Live Sequence Chart Specifications
    Kumar, Rahul
    Mercer, Eric G.
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 250 (02) : 33 - 48
  • [36] The complexity of verifying population protocols
    Esparza, Javier
    Jaax, Stefan
    Raskin, Mikhail
    Weil-Kennedy, Chana
    DISTRIBUTED COMPUTING, 2021, 34 (02) : 133 - 177
  • [37] Compiling and verifying security protocols
    Jacquemard, F
    Rusinowitch, M
    Vigneron, L
    LOGIC FOR PROGRAMMING AND AUTOMATED REASONING, PROCEEDINGS, 2000, 1955 : 131 - 160
  • [38] Verifying security protocols with Brutus
    Clarke, EM
    Jha, S
    Marrero, W
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2000, 9 (04) : 443 - 487
  • [39] Verifying authentication protocols in CSP
    Schneider, S
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1998, 24 (09) : 741 - 758
  • [40] Verifying layered security protocols
    Gibson-Robinson, Thomas
    Kamil, Allaa
    Lowe, Gavin
    JOURNAL OF COMPUTER SECURITY, 2015, 23 (03) : 259 - 307