The first edition of this book was published in 2003. Inevitably, certain parts of the book became outdated quickly. At the same time new developments have continued apace …
S Glautier - Addiction, 2004 - Wiley Online Library
This paper addresses the problem of assessing nicotine dependence. The main objective is to develop theory‐led suggestions for measures that will be relevant in the early phases of …
L Vigano - Electronic Notes in Theoretical Computer Science, 2006 - Elsevier
The AVISPA Tool is a push-button tool for the Automated Validation of Internet Security Protocols and Applications. It provides a modular and expressive formal language for …
We present the on-the-fly model checker OFMC, a tool that combines two ideas for analyzing security protocols based on lazy, demand-driven search. The first is the use of lazy data …
Recent technologies have cleared the way for large scale application of electronic communication. The open and distributed nature of these communications implies that the …
S Chaki, EM Clarke, A Groce, S Jha… - IEEE Transactions on …, 2004 - ieeexplore.ieee.org
We present a new methodology for automatic verification of C programs against finite state machine specifications. Our approach is compositional, naturally enabling us to decompose …
Many books focus on increasing the quality of software through the use of formal methods. However, most books embrace one particular method, and present it as the suggested …
Security Properties | SpringerLink Skip to main content Advertisement SpringerLink Account Menu Find a journal Publish with us Track your research Search Cart Book cover …
R Focardi, R Gorrieri - Journal of Computer security, 1995 - content.iospress.com
Several information flow security definitions, proposed in the literature, are generalized and adapted to the model of labelled transition systems. This very general model has been …