共 50 条
- [11] Verifying Implementations of Security Protocols by Refinement VERIFIED SOFTWARE: THEORIES, TOOLS, EXPERIMENTS, 2012, 7152 : 50 - +
- [13] The Simplified Inductive Approach to Verifying Security Protocols PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 523 - 526
- [14] A Z based approach to verifying security protocols FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2003, 2885 : 375 - 395
- [15] Verifying second-level security protocols THEOREM PROVING IN HIGHER ORDER LOGICS, PROCEEDINGS, 2003, 2758 : 352 - 366
- [19] Verifying liveness by augmented abstraction COMPUTER SCIENCE LOGIC, PROCEEDINGS, 1999, 1683 : 141 - 156