Application of coloured petri nets in system development

LM Kristensen, JB Jørgensen, K Jensen - … and Petri Nets: Advances in Petri …, 2004 - Springer
Abstract Coloured Petri Nets (CP-nets or CPNs) and their supporting computer tools have
been used in a wide range of application areas such as communication protocols, software …

Cloud based efficient authentication for mobile payments using key distribution method

A Saranya, R Naresh - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
The extensive usage of clever strategies fascinates numerous considerations on the
innovation intended for mobile payment method in the background of cloud computing …

Light-weight and privacy-preserving authentication protocol for mobile payments in the context of IoT

Y Chen, W Xu, L Peng, H Zhang - IEEE Access, 2019 - ieeexplore.ieee.org
The widespread use of smart devices attracts much attention on the research for a mobile
payment protocol in the context of the Internet of Things (IoT). However, payment trust and …

A Coloured Petri net approach to protocol verification

J Billington, GE Gallasch, B Han - Advanced Course on Petri Nets, 2003 - Springer
The correct operation of communication and co-operation protocols, including signalling
systems in various networks, is essential for the reliability of the many distributed systems …

A generalised sweep-line method for safety properties

LM Kristensen, T Mailund - FME 2002: Formal Methods—Getting IT Right …, 2002 - Springer
The recently developed sweep-line method exploits progress present in many concurrent
systems to explore the full state space of the system while storing only small fragments of the …

Implementing coloured Petri nets using a functional programming language

LM Kristensen, S Christensen - Higher-order and symbolic computation, 2004 - Springer
Abstract Coloured Petri Nets (CPNs) are a graphically oriented modelling language for
concurrent systems based on Petri Nets and the functional programming language Standard …

Applications of coloured Petri nets for functional validation of protocol designs

LM Kristensen, KIF Simonsen - Transactions on Petri Nets and Other …, 2013 - Springer
Communication protocols constitute central building blocks in most modern IT systems as
they define components, rules, and languages that make data communication possible. The …

The sweep-line state space exploration method

K Jensen, LM Kristensen, T Mailund - Theoretical Computer Science, 2012 - Elsevier
The sweep-line method exploits intrinsic progress in concurrent systems to alleviate the
state explosion problem in explicit state model checking. The concept of progress makes it …

Efficient path finding with the sweep-line method using external storage

LM Kristensen, T Mailund - … on Formal Engineering Methods, ICFEM 2003 …, 2003 - Springer
The sweep-line method deletes states on-the-fly during state space exploration to reduce
peak memory usage. This deletion of states prohibits the immediate generation of, eg, an …

Exploiting equivalence reduction and the sweep-line method for detecting terminal states

J Billington, GE Gallasch… - IEEE Transactions on …, 2004 - ieeexplore.ieee.org
State-space exploration is one of the main approaches to computer-aided verification and
analysis of finite-state systems. It is used to reason about a wide range of properties during …