[1] |
DU Mengyao, WANG Zheng, LI Na, QIANG Yan.
Dynamic Password Authentication Protocol for Wireless Body Area Network
[J]. Computer Engineering and Applications, 2020, 56(14): 68-73.
|
[2] |
LI Qian1, WANG Zheng1, MA Jianfen1, LI Na2.
Lightweight mobile payment protocol fairness analysis
[J]. Computer Engineering and Applications, 2018, 54(19): 82-87.
|
[3] |
QIN Manman, WANG Zheng, WANG Li.
Formal analysis and improvement of remote attestation protocol based on the SPIN
[J]. Computer Engineering and Applications, 2017, 53(1): 34-38.
|
[4] |
QIANG Xiaohui, CHEN Bo, CHEN Guokai.
Analysis and detection for HeartBleed vulnerability of OpenSSL
[J]. Computer Engineering and Applications, 2016, 52(9): 88-95.
|
[5] |
LV Jianghua1, LIU Zhifeng1, XU Yatao2, ZHOU Conghua1.
Verification of correctness of attribute based access control
[J]. Computer Engineering and Applications, 2016, 52(18): 98-103.
|
[6] |
XIA Chunrui1, WANG Rui1, LI Xiaojuan1, GUAN Yong1, ZHANG Jie2, WEI Hongxing3.
Probabilistic model checking for path planning in dynamic environment
[J]. Computer Engineering and Applications, 2016, 52(12): 5-11.
|
[7] |
HUANG Yankai, ZHOU Yu, WEI Ou.
Novel approach for attributed graph grammar response specification verification
[J]. Computer Engineering and Applications, 2016, 52(12): 15-18.
|
[8] |
WANG Ming1, WANG Rui1, LI Xiaojuan1, GUAN Yong1, ZHANG Jie2, WEI Hongxing3.
Verification of mobile robot obstacle avoidance strategies in uncertain environment based on formal modeling and probabilistic analysis
[J]. Computer Engineering and Applications, 2016, 52(10): 31-38.
|
[9] |
YU Lei1, WEI Shimin1, ZHUO Zepeng2.
Research on consistence of strand parameters for protocol principals in authentication test theory
[J]. Computer Engineering and Applications, 2015, 51(13): 86-91.
|
[10] |
HU Xiaohui1, CHEN Huili1, SHI Guangtian2, CHEN Yong1.
Formal modeling and verification of CTCS-4 security protocol
[J]. Computer Engineering and Applications, 2014, 50(4): 81-85.
|
[11] |
ZHANG Shuqing, XU Zhongwei, CHEN Zuxi.
Research on modeling and verification methods of interlocking system based on term rewriting system
[J]. Computer Engineering and Applications, 2014, 50(3): 49-54.
|
[12] |
WANG Changda1,2, DONG Xuegang1, ZHOU Conghua1,2.
Security analysis of E-bank online-payment based on UCON
[J]. Computer Engineering and Applications, 2014, 50(16): 90-94.
|
[13] |
TONG Chao, WANG Jianxin, QI Jiandong.
Approach of constructing defect rule base and detecting source code based on formal specification
[J]. Computer Engineering and Applications, 2014, 50(13): 66-72.
|
[14] |
YOU Qifang, YANG Jinji.
Model checking of SIP protocol via SPIN
[J]. Computer Engineering and Applications, 2014, 50(13): 87-89.
|
[15] |
LV Wei, HUANG Zhiqiu, CHEN Zhe, KAN Shuanglong, WEI Ou.
ESpin:SPIN-based Eclipse model checking environment
[J]. Computer Engineering and Applications, 2013, 49(7): 45-51.
|