共 50 条
- [42] Programming and Proving with Distributed Protocols PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2018, 2
- [44] Proving properties of constraint logic programs by eliminating existential variables LOGIC PROGRAMMING, PROCEEDINGS, 2006, 4079 : 179 - 195
- [45] Proving properties of term rewrite systems via logic programs REWRITING TECHNIQUES AND APPLICATIONS, PROCEEDINGS, 2004, 3091 : 170 - 184
- [46] Security Proof of KerNeeS Protocol Based on Logic of Events THEORETICAL COMPUTER SCIENCE (NCTCS 2018), 2018, 882 : 61 - 79
- [47] Proving Flow Security of Sequential Logic via Automatically-Synthesized Relational Invariants 2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 420 - 435
- [48] How to Exchange Security Events? Overview and Evaluation of Formats and Protocols PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), 2015, : 261 - 269
- [49] A Short Introduction to Two Approaches in Formal Verification of Security Protocols: Model Checking and Theorem Proving ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 8 (01): : 3 - 24
- [50] Partial model checking and theorem proving for ensuring security properties 11TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP - PROCEEDINGS, 1998, : 44 - 52