Citation: | Wang Huanbao, Zhang Yousheng, and Li Yuan. A Diagram of Strand Spaces for Security Protocols[J]. Journal of Computer Research and Development, 2006, 43(12): 2062-2068. |
[1] | Fu Liguo, Pang Jianmin, Wang Jun, Zhang Jiahao, Yue Feng. Formal Model of Correctness and Optimization on Binary Translation[J]. Journal of Computer Research and Development, 2019, 56(9): 2001-2011. DOI: 10.7544/issn1000-1239.2019.20180513 |
[2] | Wang Jian, Zhao Guosheng, Zhao Zhongnan, Li Ke. Formal Modeling and Factor Analysis for Vulnerability Propagation Oriented to SDN[J]. Journal of Computer Research and Development, 2018, 55(10): 2256-2268. DOI: 10.7544/issn1000-1239.2018.20180447 |
[3] | Wang Yong, Fang Juan, Ren Xingtian, and Lin Li. Formal Verification of TCG Remote Attestation Protocols Based on Process Algebra[J]. Journal of Computer Research and Development, 2013, 50(2): 325-331. |
[4] | Qian Zhenjiang, Liu Wei, and Huang Hao. OSOSM:Operating System Object Semantics Model and Formal Verification[J]. Journal of Computer Research and Development, 2012, 49(12): 2702-2712. |
[5] | Han Jin, Cai Shengwen, Wang Chongjun, Lai Haiguang, Xie Junyuan. A New Security Protocol Modeling Approach Based on π/+t Calculus[J]. Journal of Computer Research and Development, 2010, 47(4): 613-620. |
[6] | Hou Jinkui, Wan Jiancheng, Yang Xiao, and Wang Haiyang. Formal Semantics of Component-Based Architecture Model Mapping[J]. Journal of Computer Research and Development, 2009, 46(2): 310-320. |
[7] | Zhao Yu, Wang Yadi, Han Jihong, Fan Yudan, and Zhang Chao. A Formal Model for Cryptographic Protocols Based on Planning Theory[J]. Journal of Computer Research and Development, 2008, 45(9). |
[8] | Gu Yonggen, Fu Yuxi. Formal Analysis of Security Protocol Based on Process Calculus and Knowledge Derivation[J]. Journal of Computer Research and Development, 2006, 43(5): 953-958. |
[9] | Liu Wei and Liu Zongtian. A Formal Framework for Agent-Oriented Analysis and Design Based on Grid[J]. Journal of Computer Research and Development, 2005, 42(8): 1376-1383. |
[10] | Yang Peng and Wu Jiagao. Research on Network Service Architecture and Its Formal Model[J]. Journal of Computer Research and Development, 2005, 42(7): 1115-1122. |