Citation: | Wang Huanbao, Zhang Yousheng, and Li Yuan. A Diagram of Strand Spaces for Security Protocols[J]. Journal of Computer Research and Development, 2006, 43(12): 2062-2068. |
[1] | Feng Tao, Wang Shuaishuai, Gong Xiang, Fang Junli. Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol[J]. Journal of Computer Research and Development, 2020, 57(11): 2312-2327. DOI: 10.7544/issn1000-1239.2020.20200399 |
[2] | Fu Liguo, Pang Jianmin, Wang Jun, Zhang Jiahao, Yue Feng. Formal Model of Correctness and Optimization on Binary Translation[J]. Journal of Computer Research and Development, 2019, 56(9): 2001-2011. DOI: 10.7544/issn1000-1239.2019.20180513 |
[3] | Wang Jian, Zhao Guosheng, Zhao Zhongnan, Li Ke. Formal Modeling and Factor Analysis for Vulnerability Propagation Oriented to SDN[J]. Journal of Computer Research and Development, 2018, 55(10): 2256-2268. DOI: 10.7544/issn1000-1239.2018.20180447 |
[4] | Qian Zhenjiang, Liu Wei, and Huang Hao. OSOSM:Operating System Object Semantics Model and Formal Verification[J]. Journal of Computer Research and Development, 2012, 49(12): 2702-2712. |
[5] | Hou Jinkui, Wan Jiancheng, Yang Xiao, and Wang Haiyang. Formal Semantics of Component-Based Architecture Model Mapping[J]. Journal of Computer Research and Development, 2009, 46(2): 310-320. |
[6] | Zhao Yu, Wang Yadi, Han Jihong, Fan Yudan, and Zhang Chao. A Formal Model for Cryptographic Protocols Based on Planning Theory[J]. Journal of Computer Research and Development, 2008, 45(9). |
[7] | Gu Yonggen, Fu Yuxi. Formal Analysis of Security Protocol Based on Process Calculus and Knowledge Derivation[J]. Journal of Computer Research and Development, 2006, 43(5): 953-958. |
[8] | Liu Wei and Liu Zongtian. A Formal Framework for Agent-Oriented Analysis and Design Based on Grid[J]. Journal of Computer Research and Development, 2005, 42(8): 1376-1383. |
[9] | Yang Peng and Wu Jiagao. Research on Network Service Architecture and Its Formal Model[J]. Journal of Computer Research and Development, 2005, 42(7): 1115-1122. |
[10] | Zhou Jiantao, Shi Meilin, Ye Xinming. Formal Verification Techniques in Workflow Process Modeling[J]. Journal of Computer Research and Development, 2005, 42(1): 1-9. |