-
1
-
-
26444497860
-
The AVISPA tool for the automated validation of internet security protocols and applications
-
CAV2005, of, Springer
-
A. Armando and D.A. Basin et al. The AVISPA tool for the automated validation of internet security protocols and applications. In CAV2005, volume 3576 of LNCS, pages 281-285. Springer, 2005.
-
(2005)
LNCS
, vol.3576
, pp. 281-285
-
-
Armando, A.1
Basin, D.A.2
-
3
-
-
19044375174
-
An overview of JML tools and applications
-
L. Burdy, Y. Cheon, D.R. Cok, M.D. Ernst, J.R. Kiniry, G.T. Leavens, K.R.M. Leino, and E. Poll. An overview of JML tools and applications. STTT, 7(3):212-232, 2005.
-
(2005)
STTT
, vol.7
, Issue.3
, pp. 212-232
-
-
Burdy, L.1
Cheon, Y.2
Cok, D.R.3
Ernst, M.D.4
Kiniry, J.R.5
Leavens, G.T.6
Leino, K.R.M.7
Poll, E.8
-
6
-
-
34547416324
-
-
CEPSCO. Common Electronic Purse Specifications, 2001. Business Requirements Version 7.0, Functional Requirements Version 6.3, Technical Specification Version 2.3, available from http://www.cepsco.com.
-
CEPSCO. Common Electronic Purse Specifications, 2001. Business Requirements Version 7.0, Functional Requirements Version 6.3, Technical Specification Version 2.3, available from http://www.cepsco.com.
-
-
-
-
7
-
-
0007434664
-
Program proving: Coroutines
-
M. Clint. Program proving: Coroutines. Acta Informatica, 2:53-60, 1973.
-
(1973)
Acta Informatica
, vol.2
, pp. 53-60
-
-
Clint, M.1
-
8
-
-
0037271415
-
First-order verification of cryptographic protocols
-
E. Cohen. First-order verification of cryptographic protocols. Journal of Computer Security, 11 (2):189-216, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.2
, pp. 189-216
-
-
Cohen, E.1
-
10
-
-
0035361164
-
Software model checking: Extracting verification models from source code
-
G.J. Holzmann and M.H. Smith. Software model checking: extracting verification models from source code. Software Testing, Verification & Reliability, 11(2):65-79, 2001.
-
(2001)
Software Testing, Verification & Reliability
, vol.11
, Issue.2
, pp. 65-79
-
-
Holzmann, G.J.1
Smith, M.H.2
-
11
-
-
84947269249
-
Secure information flow as typed process behaviour
-
G. Smolka, editor, ESOP2000, of, Springer
-
K. Honda, V.T. Vasconcelos, and N. Yoshida. Secure information flow as typed process behaviour. In G. Smolka, editor, ESOP2000, volume 1782 of LNCS, pages 180-199. Springer, 2000.
-
(2000)
LNCS
, vol.1782
, pp. 180-199
-
-
Honda, K.1
Vasconcelos, V.T.2
Yoshida, N.3
-
12
-
-
84858101532
-
-
JavaSectool. http://www4.in.tum.de/~javasec.
-
JavaSectool
-
-
-
13
-
-
84858083916
-
-
http://java.sun.com/products/javacard/index.jsp.
-
-
-
-
16
-
-
84885216103
-
Secure information flow for concurrent processes
-
CONCUR 2000, of, Springer
-
J. Jurjens. Secure information flow for concurrent processes. In CONCUR 2000, volume 1877 of LNCS, pages 395-409. Springer, 2000.
-
(2000)
LNCS
, vol.1877
, pp. 395-409
-
-
Jurjens, J.1
-
18
-
-
33244457785
-
Sound methods and effective tools for model-based security engineering with UML
-
IEEE
-
J. Jürjens. Sound methods and effective tools for model-based security engineering with UML. In ICSE 2005. IEEE, 2005.
-
(2005)
ICSE 2005
-
-
Jürjens, J.1
-
19
-
-
34547453511
-
Code security analysis with assertions
-
ACM
-
J. Jürjens and M. Yampolskiy. Code security analysis with assertions. In ASE 2005, pages 392-395. ACM, 2005.
-
(2005)
ASE 2005
, pp. 392-395
-
-
Jürjens, J.1
Yampolskiy, M.2
-
21
-
-
84957071248
-
Automatic verification of cryptographic protocols with SETHEO
-
CADE-14, of, Springer
-
J. Schumann. Automatic verification of cryptographic protocols with SETHEO. In CADE-14, volume 1249 of LNCS, pages 87-100. Springer, 1997.
-
(1997)
LNCS
, vol.1249
, pp. 87-100
-
-
Schumann, J.1
-
22
-
-
84886043387
-
3 theorem prover
-
TABLEAUX 2000, of, Springer
-
3 theorem prover. In TABLEAUX 2000, volume 1847 of LNCS, pages 436-440. Springer, 2000.
-
(2000)
LNCS
, vol.1847
, pp. 436-440
-
-
Stenz, G.1
Wolf, A.2
-
23
-
-
84957640213
-
Towards an automatic analysis of security protocols in first-order logic
-
1632 of
-
C. Weidenbach. Towards an automatic analysis of security protocols in first-order logic. In CADE-16, volume 1632 of LNCS, pages 314-328, 1999.
-
(1999)
LNCS
, vol.CADE-16
, pp. 314-328
-
-
Weidenbach, C.1
|