[1] |
LI Qian1, WANG Zheng1, MA Jianfen1, LI Na2.
Lightweight mobile payment protocol fairness analysis
[J]. Computer Engineering and Applications, 2018, 54(19): 82-87.
|
[2] |
QIN Manman, WANG Zheng, WANG Li.
Formal analysis and improvement of remote attestation protocol based on the SPIN
[J]. Computer Engineering and Applications, 2017, 53(1): 34-38.
|
[3] |
LV Jianghua1, LIU Zhifeng1, XU Yatao2, ZHOU Conghua1.
Verification of correctness of attribute based access control
[J]. Computer Engineering and Applications, 2016, 52(18): 98-103.
|
[4] |
XIA Chunrui1, WANG Rui1, LI Xiaojuan1, GUAN Yong1, ZHANG Jie2, WEI Hongxing3.
Probabilistic model checking for path planning in dynamic environment
[J]. Computer Engineering and Applications, 2016, 52(12): 5-11.
|
[5] |
HUANG Yankai, ZHOU Yu, WEI Ou.
Novel approach for attributed graph grammar response specification verification
[J]. Computer Engineering and Applications, 2016, 52(12): 15-18.
|
[6] |
WANG Ming1, WANG Rui1, LI Xiaojuan1, GUAN Yong1, ZHANG Jie2, WEI Hongxing3.
Verification of mobile robot obstacle avoidance strategies in uncertain environment based on formal modeling and probabilistic analysis
[J]. Computer Engineering and Applications, 2016, 52(10): 31-38.
|
[7] |
ZHANG Shuqing, XU Zhongwei, CHEN Zuxi.
Research on modeling and verification methods of interlocking system based on term rewriting system
[J]. Computer Engineering and Applications, 2014, 50(3): 49-54.
|
[8] |
WANG Changda1,2, DONG Xuegang1, ZHOU Conghua1,2.
Security analysis of E-bank online-payment based on UCON
[J]. Computer Engineering and Applications, 2014, 50(16): 90-94.
|
[9] |
TONG Chao, WANG Jianxin, QI Jiandong.
Approach of constructing defect rule base and detecting source code based on formal specification
[J]. Computer Engineering and Applications, 2014, 50(13): 66-72.
|
[10] |
YOU Qifang, YANG Jinji.
Model checking of SIP protocol via SPIN
[J]. Computer Engineering and Applications, 2014, 50(13): 87-89.
|
[11] |
LV Wei, HUANG Zhiqiu, CHEN Zhe, KAN Shuanglong, WEI Ou.
ESpin:SPIN-based Eclipse model checking environment
[J]. Computer Engineering and Applications, 2013, 49(7): 45-51.
|
[12] |
CHEN Juanjuan, WEI Ou, HUANG Zhiqiu, CHEN Zhe.
Refinement and symmetry reduction of bilattice-based multi-valued models
[J]. Computer Engineering and Applications, 2013, 49(22): 40-45.
|
[13] |
JI Lixia1, MA Jianhong1, ZHOU Qinglei2.
Study of model and verification about hybrid system based on extended timed automata
[J]. Computer Engineering and Applications, 2012, 48(8): 73-75.
|
[14] |
DONG Lingling1, GUAN Yong1, LI Xiaojuan1, SHI Zhiping1, ZHANG Jie2, HUA Wei1.
Verification for SpaceWire error detection mechanism by LTL model checking
[J]. Computer Engineering and Applications, 2012, 48(22): 88-94.
|
[15] |
MIAO Li, TAN Zhihua, ZHANG Dafang.
Effective model checking of network authentication protocol based on SPIN
[J]. Computer Engineering and Applications, 2012, 48(21): 62-67.
|