Publisher
Springer International Publishing
Reference23 articles.
1. Avalle, M., Alfredo, P., Bogdan, W.: Formal verification of security protocol implementations: a survey. Formal Aspects Comput. 26(1), 99–123 (2014)
2. Bolignano, D.: Towards the formal verification of electronic commerce protocols. In: The 10th IEEE Computer Security Foundation Workshop, Rockport, USA, pp. 133–146 (1997)
3. Bau, J., Mitchell, J.C.: Security modeling and analysis. IEEE Secur. Priv. 9(3), 18–25 (2011)
4. Cheng, J., Miura, J.: Deontic relevant logic as the logical basis for specifying, verifying, and reasoning about information security and information assurance. In: The 1st International Conference on Availability, Reliability and Security (ARES 2006), pp. 601–608. IEEE Computer Society, Vienna (2006)
5. Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence);J Cheng,2007