-
1
-
-
26444497860
-
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications
-
Etessami and Rajamani (eds.). Springer
-
A. Armando, D. A. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cullar, P. H. Drielsma, P.-C. Ham, O. Kouchnarenko, J. Mantovani, S. Mdersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Vigan, L. Vigneron. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In Etessami and Rajamani (eds.), CAV. Lecture Notes in Computer Science 3576, pp. 281-285. Springer, 2005
-
(2005)
CAV. Lecture Notes in Computer Science 3576
, pp. 281-285
-
-
Armando, A.1
Basin, D.A.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cullar, J.6
Drielsma, P.H.7
Ham, P.-C.8
Kouchnarenko, O.9
Mantovani, J.10
Mdersheim, S.11
von Oheimb, D.12
Rusinowitch, M.13
Santiago, J.14
Turuani, M.15
Vigan, L.16
Vigneron, L.17
-
3
-
-
17644411480
-
Mobile values, new names, and secure communication
-
M. Abadi, C. Fournet. Mobile values, new names, and secure communication. SIGPLAN Not. 36(3):104-115, 2001
-
(2001)
SIGPLAN Not
, vol.36
, Issue.3
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
5
-
-
84863918586
-
Kronos: A Model-Checking Tool for Real-Time Systems
-
Springer Verlag
-
M. Bozga, C. Daws, O. Maler, A. Olivero, StavrosTripakis, S. Yovine. Kronos: A Model-Checking Tool for Real-Time Systems. In CAV '98: Proceedings of the 10th International Conference on Computer Aided Verification. Pp. 546-550. Springer Verlag, 1998
-
(1998)
CAV '98: Proceedings of the 10th International Conference on Computer Aided Verification
, pp. 546-550
-
-
Bozga, M.1
Daws, C.2
Maler, O.3
Olivero, A.4
Tripakis, S.5
Yovine, S.6
-
8
-
-
84958037228
-
UPPAAL-a Tool Suite for Automatic Verification of Real-Time Systems
-
Lecture Notes in Computer Science 1066. Springer Verlag
-
J. Bengtsson, K. G. Larsen, F. Larsson, P. Pettersson, W. Yi. UPPAAL-a Tool Suite for Automatic Verification of Real-Time Systems. In Proceedings of Workshop on Verification and Control of Hybrid Systems III. Lecture Notes in Computer Science 1066, pp. 232-243. Springer Verlag, 1995
-
(1995)
In Proceedings of Workshop on Verification and Control of Hybrid Systems III
, pp. 232-243
-
-
Bengtsson, J.1
Larsen, K.G.2
Larsson, F.3
Pettersson, P.4
Yi, W.5
-
10
-
-
0020226119
-
Using Branching Time Temporal Logic to Synthesise Synchronisation Skeletons
-
E. M. Clarke, E. A. Emerson. Using Branching Time Temporal Logic to Synthesise Synchronisation Skeletons. Science of Computer Programming 2:241-266, 1982
-
(1982)
Science of Computer Programming
, vol.2
, pp. 241-266
-
-
Clarke, E.M.1
Emerson, E.A.2
-
11
-
-
2942585067
-
An ontology for context-aware pervasive computing environments
-
H. Chen, T. Finin, A. Joshi. An ontology for context-aware pervasive computing environments. Knowl. Eng. Rev. 18(3):197-207, 2003
-
(2003)
Knowl. Eng. Rev
, vol.18
, Issue.3
, pp. 197-207
-
-
Chen, H.1
Finin, T.2
Joshi, A.3
-
14
-
-
33750454059
-
A Formal Analysis of Bluetooth Device Discovery
-
M. Duflot, M. Z. Kwiatkowska, G. Norman, D. Parker. A Formal Analysis of Bluetooth Device Discovery. STTT 8(6):621-632, 2006
-
(2006)
STTT
, vol.8
, Issue.6
, pp. 621-632
-
-
Duflot, M.1
Kwiatkowska, M.Z.2
Norman, G.3
Parker, D.4
-
19
-
-
57049151715
-
Temporal Representation and Reasoning
-
Van Harmelen et al. (eds.). Elsevier Press
-
M. Fisher. Temporal Representation and Reasoning. In van Harmelen et al. (eds.), Handbook of Knowledge Representation. Elsevier Press, 2007
-
(2007)
Handbook of Knowledge Representation
-
-
Fisher, M.1
-
20
-
-
3543103196
-
Model Checking for Combined Logics with an Application to Mobile Systems
-
M. Franceschet, A. Montanari, M. De Rijke. Model Checking for Combined Logics with an Application to Mobile Systems. Automated Software Engg. 11(3):289-321, 2004
-
(2004)
Automated Software Engg
, vol.11
, Issue.3
, pp. 289-321
-
-
Franceschet, M.1
Montanari, A.2
De Rijke, M.3
-
21
-
-
20844459862
-
RFID Privacy: An Overview of Problems and Proposed Solutions
-
S. L. Garfinkel, A. Juels, R. Pappu. RFID Privacy: An Overview of Problems and Proposed Solutions. IEEE Security and Privacy 3(3):34-43, 2005
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 34-43
-
-
Garfinkel, S.L.1
Juels, A.2
Pappu, R.3
-
26
-
-
0003096318
-
A Logic for Reasoning about Time and Reliability
-
H. Hansson, B. Jonsson. A Logic for Reasoning about Time and Reliability. Formal Aspects of Computing 6:102-111, 1994
-
(1994)
Formal Aspects of Computing
, vol.6
, pp. 102-111
-
-
Hansson, H.1
Jonsson, B.2
-
28
-
-
33745802027
-
PRISM: A Tool for Automatic Verification of Probabilistic Systems
-
Lecture Notes in Computer Science 3920. Springer
-
A. Hinton, M. Kwiatkowska, G. Norman, D. Parker. PRISM: A Tool for Automatic Verification of Probabilistic Systems. In Proc. 12th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'06). Lecture Notes in Computer Science 3920, pp. 441-444. Springer, 2006
-
(2006)
In Proc. 12th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'06)
, pp. 441-444
-
-
Hinton, A.1
Kwiatkowska, M.2
Norman, G.3
Parker, D.4
-
29
-
-
18744373491
-
Approximate Probabilistic Model Checking
-
Lecture Notes in Computer Science 2937. Springer
-
T. Hérault, R. Lassaigne, F. Magniette, S. Peyronnet. Approximate Probabilistic Model Checking. In Proc. 5th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'04). Lecture Notes in Computer Science 2937, pp. 307-329. Springer, 2004
-
(2004)
In Proc. 5th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'04)
, pp. 307-329
-
-
Hérault, T.1
Lassaigne, R.2
Magniette, F.3
Peyronnet, S.4
-
30
-
-
3142662048
-
Complete Axiomatizations for Reasoning about Knowledge and Time
-
J. Y. Halpern, R. van der Meyden, M. Y. Vardi. Complete Axiomatizations for Reasoning about Knowledge and Time. SIAM J. Comput. 33(3):674-703, 2004
-
(2004)
SIAM J. Comput
, vol.33
, Issue.3
, pp. 674-703
-
-
Halpern, J.Y.1
van der Meyden, R.2
Vardi, M.Y.3
-
33
-
-
0041806074
-
-
University of Berne, Switzerland
-
G. Jaeger, A. Heuerding, S. Schwendimann, F. Achermann, P. Balsiger, P. Brambilla, H. Zimmermann, M. Bianchi, K. Guggisberg, W. Heinle. LWB-The Logics Workbench 1.0. http://lwbwww.unibe.ch:8080/LWBinfo.html, 1996. University of Berne, Switzerland
-
(1996)
LWB-The Logics Workbench 1.0
-
-
Jaeger, G.1
Heuerding, A.2
Schwendimann, S.3
Achermann, F.4
Balsiger, P.5
Brambilla, P.6
Zimmermann, H.7
Bianchi, M.8
Guggisberg, K.9
Heinle, W.10
-
35
-
-
24044475901
-
From Bounded to Unbounded Model Checking for Temporal Epistemic Logic
-
M. Kacprzak, A. Lomuscio, W. Penczek. From Bounded to Unbounded Model Checking for Temporal Epistemic Logic. Fundam. Inform. 63(2-3):221-240, 2004
-
(2004)
Fundam. Inform
, vol.63
, Issue.2-3
, pp. 221-240
-
-
Kacprzak, M.1
Lomuscio, A.2
Penczek, W.3
-
38
-
-
0031633395
-
Casper: A Compiler for the Analysis of Security Protocols
-
G. Lowe. Casper: A Compiler for the Analysis of Security Protocols. Journal of Computer Security 6(1-2):53-84, 1998
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 53-84
-
-
Lowe, G.1
-
41
-
-
85042867352
-
-
N13490, Korea Technology Center
-
E. K. Paik, M.-K. Shin, J. Hwang, J. Choi. Design Goals and General Requirements for Future Network. N13490, Korea Technology Center, 2008
-
(2008)
Design Goals and General Requirements for Future Network
-
-
Paik, E.K.1
Shin, M.-K.2
Hwang, J.3
Choi, J.4
-
42
-
-
84937915571
-
ContextUML: A UML-Based Modeling Language for Model-Driven Development of Context-Aware Web Services Development
-
Q. Z. Sheng, B. Benatallah. ContextUML: A UML-Based Modeling Language for Model-Driven Development of Context-Aware Web Services Development. Volume 0, pp. 206-212. IEEE Computer Society, 2005
-
(2005)
IEEE Computer Society
, pp. 206-212
-
-
Sheng, Q.Z.1
Benatallah, B.2
-
44
-
-
21144438831
-
Security and Privacy Aspects of Low-Cost Radio
-
Springer-Verlag, march
-
S. A. Weis, S. E. Sarma, R. L. Rivest, D. W. Engels. Security and Privacy Aspects of Low-Cost Radio. In Hutter, D., Müller, G., Stephan, W., Ullman, M., eds.: International Conference on Security in Pervasive Computing-SPC 2003, volume 2802 of LNCS, Boppard, Germany. Pp. 454-469. Springer-Verlag, march 2003
-
(2003)
Hutter, D., Müller, G., Stephan, W., Ullman, M., eds.: International Conference on Security in Pervasive Computing-SPC 2003, volume 2802 of LNCS, Boppard, Germany
, pp. 454-469
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
|