more
This commit is contained in:
47
main.bbl
47
main.bbl
@@ -1,5 +1,5 @@
|
||||
% Generated by IEEEtran.bst, version: 1.14 (2015/08/26)
|
||||
\begin{thebibliography}{1}
|
||||
\begin{thebibliography}{10}
|
||||
\providecommand{\url}[1]{#1}
|
||||
\csname url@samestyle\endcsname
|
||||
\providecommand{\newblock}{\relax}
|
||||
@@ -21,6 +21,51 @@
|
||||
\providecommand{\BIBdecl}{\relax}
|
||||
\BIBdecl
|
||||
|
||||
\bibitem{Lamport_1994}
|
||||
L.~Lamport, ``\BIBforeignlanguage{en}{The temporal logic of actions},''
|
||||
\emph{\BIBforeignlanguage{en}{ACM Transactions on Programming Languages and
|
||||
Systems}}, vol.~16, no.~3, p. 872–923, May 1994.
|
||||
|
||||
\bibitem{Holzmann_1997}
|
||||
G.~Holzmann, ``\BIBforeignlanguage{en}{The model checker spin},''
|
||||
\emph{\BIBforeignlanguage{en}{IEEE Transactions on Software Engineering}},
|
||||
vol.~23, no.~5, p. 279–295, May 1997.
|
||||
|
||||
\bibitem{Clarke_Wang}
|
||||
E.~M. Clarke and Q.~Wang, ``\BIBforeignlanguage{en}{25 years of model
|
||||
checking}.''
|
||||
|
||||
\bibitem{Basin_Cremers_Dreier_Sasse_2022}
|
||||
D.~Basin, C.~Cremers, J.~Dreier, and R.~Sasse,
|
||||
``\BIBforeignlanguage{en}{Tamarin: Verification of large-scale, real-world,
|
||||
cryptographic protocols},'' \emph{\BIBforeignlanguage{en}{IEEE Security &
|
||||
Privacy}}, vol.~20, no.~3, p. 24–32, May 2022.
|
||||
|
||||
\bibitem{Blanchet_Smyth_Cheval_Sylvestre}
|
||||
B.~Blanchet, B.~Smyth, V.~Cheval, and M.~Sylvestre,
|
||||
``\BIBforeignlanguage{en}{Proverif 2.05: Automatic cryptographic protocol
|
||||
verifier, user manual and tutorial}.''
|
||||
|
||||
\bibitem{Kobeissi_Nicolas_Tiwari}
|
||||
N.~Kobeissi, G.~Nicolas, and M.~Tiwari, ``\BIBforeignlanguage{en}{Verifpal:
|
||||
Cryptographic protocol analysis for the real world}.''
|
||||
|
||||
\bibitem{Blanchet_Jacomme}
|
||||
B.~Blanchet and C.~Jacomme, ``\BIBforeignlanguage{en}{Cryptoverif: a
|
||||
computationally-sound security protocol verifier}.''
|
||||
|
||||
\bibitem{Basin_Linker_Sasse}
|
||||
D.~Basin, F.~Linker, and R.~Sasse, ``\BIBforeignlanguage{en}{A formal analysis
|
||||
of the imessage pq3 messaging protocol}.''
|
||||
|
||||
\bibitem{Hippel2022}
|
||||
\BIBentryALTinterwordspacing
|
||||
M.~von Hippel, C.~Vick, S.~Tripakis, and C.~Nita-Rotaru, ``Automated attacker
|
||||
synthesis for distributed protocols,'' no. arXiv:2004.01220, Apr. 2022,
|
||||
arXiv:2004.01220 [cs]. [Online]. Available:
|
||||
\url{http://arxiv.org/abs/2004.01220}
|
||||
\BIBentrySTDinterwordspacing
|
||||
|
||||
\bibitem{Vardi_Wolper_1986}
|
||||
\BIBentryALTinterwordspacing
|
||||
M.~Y. Vardi and P.~Wolper, ``\BIBforeignlanguage{English}{An automata-theoretic
|
||||
|
||||
Reference in New Issue
Block a user