共 50 条
- [42] Verifying the independence of security protocols ICCP 2007: IEEE 3RD INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2007, : 155 - +
- [43] Verifying authentication protocols with CSP 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 3 - 17
- [46] Verifying the Precedence Property Pattern Using the B Method 2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON HIGH-ASSURANCE SYSTEMS ENGINEERING (HASE), 2014, : 229 - 233
- [47] Method for verifying the correctness of train control system design Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2010, 45 (04): : 574 - 579
- [48] Verifying Data Integration Configurations for Semantical Correctness and Completeness GERMAN MEDICAL DATA SCIENCES: SHAPING CHANGE - CREATIVE SOLUTIONS FOR INNOVATIVE MEDICINE (GMDS 2019), 2019, 267 : 66 - 73
- [50] REDUCTION TECHNIQUE FOR VERIFYING THE CORRECTNESS OF LOGIC CONTROL ALGORITHMS AVTOMATIKA I VYCHISLITELNAYA TEKHNIKA, 1988, (04): : 19 - 23