Wyniki wyszukiwania dla: Steve Schneider
IEEE Security & Privacy > 2017 > 15 > 3 > 12 - 13
IEEE Security & Privacy > 2016 > 14 > 4 > 64 - 73
Formal Aspects of Computing > 2016 > 28 > 6 > 909-935
Lecture Notes in Computer Science > B 2007: Formal Specification and Development in B > Regular Papers > 34-48
Lecture Notes in Computer Science > Abstract State Machines, B and Z > Chapter 5. ABZ Short Papers > 359-359
Lecture Notes in Computer Science > Integrated Formal Methods > Session: State/Event-Based Verification > 89-108
Lecture Notes in Computer Science > Communicating Sequential Processes. The First 25 Years > Security > 243-263
Lecture Notes in Computer Science > ZB 2002:Formal Specification and Development in Z and B > 416-435
Lecture Notes in Computer Science > Rigorous Methods for Software Construction and Analysis > 130-146
Lecture Notes in Computer Science > Formal Methods and Software Engineering > Verification II > 371-387
Lecture Notes in Computer Science > FM’99 — Formal Methods > Security > 738-757
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2010 > Security Analysis, Pseudorandom Permutations and Applications > 98-114