[1] |
LIU Zi-yuan, MA Zhan-you, LI Xia, GAO Ying-nan, HE Na-na, HUANG Rui-qi.
Fuzzy computation tree logic* model checking based on fuzzy measures
[J]. Computer Engineering & Science, 2024, 46(04): 676-683.
|
[2] |
LI Zhao-kai, MA Zhan-you, LI Jian-xiang, GUO Hao.
Model checking of fuzzy computation tree logic based on fuzzy decision process
[J]. Computer Engineering & Science, 2022, 44(02): 266-275.
|
[3] |
ZHENG Xiao-yu, LIU Dong-mei, DU Yi-ning, ZHOU Zi-jian, QIU Mei-mei, ZHU Hong.
Verification of pattern driven system security design
[J]. Computer Engineering & Science, 2020, 42(07): 1197-1207.
|
[4] |
ZHONG Xiaomei,XIAO Meihua,LI Wei,CHEN Jia,LI Yanan.
Formal analysis and improvement of RCIA:
An ultra-lightweight RFID- mutual authentication protocol
[J]. Computer Engineering & Science, 2018, 40(12): 2183-2192.
|
[5] |
WANG Yapeng,LEI Lihui.
Formal verification of gastric adenocarcinoma
core pathway based on CTL model checking
[J]. Computer Engineering & Science, 2018, 40(12): 2280-2286.
|
[6] |
LEI Lihui,GUO Yue,ZHANG Yanbo.
Symbolic CTL model checking based on possibility measure
[J]. Computer Engineering & Science, 2018, 40(11): 2008-2014.
|
[7] |
XIAO Mei-hua1,MEI Ying-tian1,2,LI Wei1,LI Ya-nan1,ZHONG Xiao-mei1,SONG Zi-fan1.
Security analysis of Nayak-T protocol
based on time stamp and private key signature
[J]. Computer Engineering & Science, 2017, 39(12): 2252-2259.
|
[8] |
YUAN Hong-juan1,2,MA Yan-fang3,PAN Hai-yu1,2.
Model checking for fuzzy alternating-time temporal logic
[J]. Computer Engineering & Science, 2017, 39(12): 2290-2296.
|
[9] |
LIN Zhe-chao,DONG Wei.
Implementation and optimization of
LTL probabilistic model checker
[J]. Computer Engineering & Science, 2017, 39(05): 892-896.
|
[10] |
WU Gege,ZHUANG Lei,ZHANG Kunli,WANG Guoqing.
Formal analysis and verification of mobile
payment protocol PCMS
[J]. Computer Engineering & Science, 2017, 39(01): 67-73.
|
[11] |
CHENG Daolei,XIAO Meihua,LIU Xinqian,MEI Yingtian,LI Wei.
Analyzing and verifying an open authorization
protocol OAuth 2.0 with SPIN
[J]. J4, 2015, 37(11): 2121-2127.
|
[12] |
MA Zhanyou1,2,LI Yongming1.
Computation tree logic model checking for
generalized possibilistic decision processes
[J]. J4, 2015, 37(11): 2162-2168.
|
[13] |
LIU Jiao,LEI Lihui.
A threevalued logic model checking approach based
on extensional partial Kripke structure
[J]. J4, 2015, 37(10): 1884-1889.
|
[14] |
XU Liang,LIU Hong.
Bounded model checking of
TECTL properties based on SMT
[J]. J4, 2013, 35(10): 166-171.
|
[15] |
ZHOU Xuan,WANG Xueming.
Improvement and Model Checking of Micro-Payment Protocol Millicent
[J]. J4, 2012, 34(12): 22-26.
|