-
1
-
-
84860943932
-
-
CafeOBJ web page. URL http://www.ldl.jaist.ac.jp/cafeobj/
-
CafeOBJ Web Page
-
-
-
2
-
-
0032671775
-
A meta-notation for protocol analysis
-
Cervesato I., Durgin H., Lincoln P., Mitchell J., Scedrov A. A meta-notation for protocol analysis. 12th IEEE CSFW. 1999;55-69
-
(1999)
12th IEEE CSFW
, pp. 55-69
-
-
Cervesato, I.1
Durgin, H.2
Lincoln, P.3
Mitchell, J.4
Scedrov, A.5
-
6
-
-
0001858965
-
Behavioural coherence in object-oriented algebraic specification
-
Diaconescu R., Futatsugi K. Behavioural coherence in object-oriented algebraic specification. Universal Computer Science. 6:2000;74-96
-
(2000)
Universal Computer Science
, vol.6
, pp. 74-96
-
-
Diaconescu, R.1
Futatsugi, K.2
-
7
-
-
0020720357
-
On the security of public key protocols
-
Dolev J.D., Yao A.C. On the security of public key protocols. IEEE Trans. Inform. Theory. IT-29:1983;198-208
-
(1983)
IEEE Trans. Inform. Theory
, vol.IT-29
, pp. 198-208
-
-
Dolev, J.D.1
Yao, A.C.2
-
13
-
-
0035563205
-
Web-based support for cooperative software engineering
-
Goguen J.A.K. Web-based support for cooperative software engineering. Annals of Software Engineering. 12:2001;167-191
-
(2001)
Annals of Software Engineering
, vol.12
, pp. 167-191
-
-
Goguen, J.A.K.1
-
14
-
-
1842709637
-
"refutational Theorem Proving using Term Rewriting Systems,"
-
University of Illinois at Champaign-Urbana
-
Hsiang J. "Refutational Theorem Proving using Term Rewriting Systems," Ph.D. thesis. 1981;University of Illinois at Champaign-Urbana
-
(1981)
Ph.D. Thesis
-
-
Hsiang, J.1
-
15
-
-
28144456308
-
An attack on the Needham-Schroeder public-key authentication protocol
-
Lowe G. An attack on the Needham-Schroeder public-key authentication protocol. Inf. Process. Lett. 56:1995;131-133
-
(1995)
Inf. Process. Lett.
, vol.56
, pp. 131-133
-
-
Lowe, G.1
-
16
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR. TACAS ′96
-
Lowe G. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. TACAS ′96. LNCS 1055. 1996;147-166
-
(1996)
LNCS 1055
, pp. 147-166
-
-
Lowe, G.1
-
17
-
-
84860940945
-
-
Maude web page. URL http://maude.csl.sri.com/
-
Maude Web Page
-
-
-
18
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham R.M., Schroeder M.D. Using encryption for authentication in large networks of computers. Comm. ACM. 21:1978;993-999
-
(1978)
Comm. ACM
, vol.21
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
19
-
-
0346537831
-
Modeling and verification of distributed real-time systems based on CafeOBJ
-
Ogata K., Futatsugi K. Modeling and verification of distributed real-time systems based on CafeOBJ. ASE ′01. 2001;185-192
-
(2001)
ASE ′01
, pp. 185-192
-
-
Ogata, K.1
Futatsugi, K.2
-
20
-
-
84891332068
-
Formal analysis of Suzuki&Kasami distributed mutual exclusion algorithm
-
Ogata K., Futatsugi K. Formal analysis of Suzuki&Kasami distributed mutual exclusion algorithm. FMOODS ′02. 2002;181-195
-
(2002)
FMOODS ′02
, pp. 181-195
-
-
Ogata, K.1
Futatsugi, K.2
-
21
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson L.C. The inductive approach to verifying cryptographic protocols. J. Computer Security. 6:1998;85-128
-
(1998)
J. Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
22
-
-
0000937825
-
Verifying authentication protocols in CSP
-
Schneider S. Verifying authentication protocols in CSP. IEEE Trans. on Softw. Eng. 24:1998;741-758
-
(1998)
IEEE Trans. on Softw. Eng.
, vol.24
, pp. 741-758
-
-
Schneider, S.1
|