Publisher
Springer Berlin Heidelberg
Reference10 articles.
1. Abrial, J.-R.: The B book - Assigning Programs to Meanings. Cambridge University Press, Cambridge (1996)
2. EATCS Textbook in Computer Science;D. Bjørner,2007
3. Bolignano, D.: Integrating proof-based and model-checking techniques for the formal verification of cryptographic protocols. In: CAV, pp. 77–87 (1998)
4. Cansell, D., Méry, D.: The event-B Modelling Method: Concepts and Case Studies, pp. 33–140. Springer, Heidelberg (2007) See [2]
5. Cansell, D., Méry, D.: Incremental parametric development of greedy algorithms. Electr. Notes Theor. Comput. Sci. 185, 47–62 (2007)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Applying a Dependency Mechanism for Voting Protocol Models Using Event-B;Formal Techniques for Distributed Objects, Components, and Systems;2017
2. Proof-Based Design of Security Protocols;Computer Science – Theory and Applications;2010