TAuth: Verifying Timed Security Protocols (Englisch)
- Neue Suche nach: Li, L.
- Neue Suche nach: Sun, J.
- Neue Suche nach: Liu, Y.
- Neue Suche nach: Dong, J.S.
- Neue Suche nach: Li, L.
- Neue Suche nach: Sun, J.
- Neue Suche nach: Liu, Y.
- Neue Suche nach: Dong, J.S.
- Neue Suche nach: Merz, Stephan
- Neue Suche nach: Pang, Jun
In:
Formal engineering methods; Formal methods and software engineering; ICFEM 2014
8829
;
300-315
;
2014
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:TAuth: Verifying Timed Security Protocols
-
Beteiligte:Li, L. ( Autor:in ) / Sun, J. ( Autor:in ) / Liu, Y. ( Autor:in ) / Dong, J.S. ( Autor:in ) / Merz, Stephan / Pang, Jun
-
Kongress:International conference; 16th, Formal engineering methods; Formal methods and software engineering; ICFEM 2014 ; 2014 ; Luxembourg
-
Erschienen in:LECTURE NOTES IN COMPUTER SCIENCE , 8829 ; 300-315
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Cham
-
Erscheinungsdatum:01.01.2014
-
Format / Umfang:16 pages
-
Anmerkungen:Includes bibliographical references and index
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Approximations for Stochastic Graph RewritingDanos, V. / Heindel, T. / Honorato-Zimmer, R. / Stucki, S. et al. | 2014
- 11
-
Computing Maximal BisimulationsBoulgakov, A. / Gibson-Robinson, T. / Roscoe, A.W. et al. | 2014
- 27
-
Improving the Model Checking of Strategies under Partial Observability and Fairness ConstraintsBusard, S. / Pecheur, C. / Qu, H. / Raimondi, F. et al. | 2014
- 43
-
A Formal Model for Natural-Language Timed Requirements of Reactive SystemsCarvalho, G. / Carvalho, A. / Rocha, E. / Cavalcanti, A. / Sampaio, A. et al. | 2014
- 59
-
A Hybrid Model of Connectors in Cyber-Physical SystemsChen, X. / Sun, J. / Sun, M. et al. | 2014
- 75
-
A Language-Independent Proof System for Mutual Program EquivalenceCiobaca, S. / Lucanu, D. / Rusu, V. / Rosu, G. et al. | 2014
- 91
-
PHASE: A Stochastic Formalism for Phase-Type DistributionsCiobanu, G. / Rotaru, A.S. et al. | 2014
- 107
-
CASSANDRA: An Online Failure Prediction Strategy for Dynamically Evolving SystemsDe Angelis, F. / Di Berardini, M.R. / Muccini, H. / Polini, A. et al. | 2014
- 123
-
Modal Characterisations of Probabilistic and Fuzzy BisimulationsDeng, Y. / Wu, H. et al. | 2014
- 139
-
Pointer Program Derivation Using Coq: Graphs and Schorr-Waite AlgorithmDufourd, J.-F. et al. | 2014
- 155
-
An LTL Model Checking Approach for Biological Parameter InferenceGallet, E. / Manceny, M. / Gall, P.L. / Ballarini, P. et al. | 2014
- 171
-
SCC-Based Improved Reachability Analysis for Markov Decision ProcessesGui, L. / Sun, J. / Song, S. / Liu, Y. / Dong, J.S. et al. | 2014
- 187
-
Comprehension of Spacecraft Telemetry Using Hierarchical Specifications of BehaviorHavelund, K. / Joshi, R. et al. | 2014
- 203
-
Timed Automata Verification via IC3 with ZonesIsenberg, T. / Wehrheim, H. et al. | 2014
- 219
-
GRL: A Specification Language for Globally Asynchronous Locally Synchronous SystemsJebali, F. / Lang, F. / Mateescu, R. et al. | 2014
- 235
-
A Formal Framework to Prove the Correctness of Model Driven Engineering Composition OperatorsHamiaz, M.K. / Pantel, M. / Combemale, B. / Thirioux, X. et al. | 2014
- 251
-
A Formula-Based Approach for Automatic Fault Localization of Imperative ProgramsLamraoui, S.-M. / Nakajima, S. et al. | 2014
- 267
-
A Resource-Based Logic for Termination and Non-termination ProofsLe, T.C. / Gherghina, C. / Hobor, A. / Chin, W.-N. et al. | 2014
- 284
-
Practical Analysis Framework for Software-Based Attestation SchemeLi, L. / Hu, H. / Sun, J. / Liu, Y. / Dong, J.S. et al. | 2014
- 300
-
TAuth: Verifying Timed Security ProtocolsLi, L. / Sun, J. / Liu, Y. / Dong, J.S. et al. | 2014
- 316
-
On the Formal Analysis of HMM Using Theorem ProvingLiu, L. / Aravantinos, V. / Hasan, O. / Tahar, S. et al. | 2014
- 332
-
Formal Modeling and Analysis of Cassandra in MaudeLiu, S. / Rahman, M.R. / Skeirik, S. / Gupta, I. / Meseguer, J. et al. | 2014
- 348
-
Bounded Model Checking High Level Petri Nets in PIPE+VerifierLiu, S. / Zeng, R. / Sun, Z. / He, X. et al. | 2014
- 364
-
Fast Translation from LTL to Buchi Automata via Non-transition-Based AutomataMochizuki, S. / Shimakawa, M. / Hagihara, S. / Yonezaki, N. et al. | 2014
- 380
-
Complete Model-Based Equivalence Class Testing for the ETCS Ceiling Speed MonitorBraunstein, C. / Haxthausen, A.E. / Huang, W.-l. / Hubner, F. / Peleska, J. / Schulze, U. / Hong, L.V. et al. | 2014
- 396
-
Contract-Based Verification of MATLAB and Simulink Matrix-Manipulating CodeWiik, J. / Bostrom, P. et al. | 2014
- 413
-
GPU Accelerated Counterexample Generation in LTL Model CheckingWu, Z. / Liu, Y. / Liang, Y. / Sun, J. et al. | 2014
- 430
-
Formal Throughput and Response Time Analysis of MARTE ModelsYan, G. / Zhu, X.-Y. / Yan, R. / Li, G. et al. | 2014
- 446
-
Extending MSVL with Function CallsZhang, N. / Duan, Z. / Tian, C. et al. | 2014