Author:
Marchand Hervé,Dubreil Jérémy,Jéron Thierry
Publisher
Springer Berlin Heidelberg
Reference15 articles.
1. Lecture Notes in Computer Science;R. Alur,2006
2. Badouel, E., Bednarczyk, M., Borzyszkowski, A., Caillaud, B., Darondeau, P.: Concurrent secrets. Discrete Event Dynamic Systems 17, 425–446 (2007)
3. Bishop, M.: Introduction to computer security. Addison-Wesley Professional, Reading (2004)
4. Blanchet, B., Abadi, M., Fournet, C.: Automated Verification of Selected Equivalences for Security Protocols. In: 20th IEEE Symposium on Logic in Computer Science (LICS 2005), Chicago, IL, June 2005, pp. 331–340 (2005)
5. Bryans, J.W., Koutny, M., Mazaré, L., Ryan, P.: Opacity generalised to transition systems. International Journal of Information Security 7(6), 421–435 (2008)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Enforcement and validation (at runtime) of various notions of opacity;Discrete Event Dynamic Systems;2014-07-05
2. Risk-based testing via active continuous quality control;International Journal on Software Tools for Technology Transfer;2014-05-30
3. APSET, an Android aPplication SEcurity Testing tool for detecting intent-based vulnerabilities;International Journal on Software Tools for Technology Transfer;2014-02-27
4. More testable properties;International Journal on Software Tools for Technology Transfer;2011-12-08