Citation to this article as recorded by
Huang, W. and B. Meng, 2011. Automated proof of resistance of denial of service attacks in remote internet voting protocol with extended applied Pi calculus. Inform. Technol. J., 10: 1468-1483. CrossRef |
Jianyu, X. and D. Jingguo, 2012. Specifications mining based on adjusted automata learning algorithm. Inform. Technol. J., 11: 1391-1399. CrossRefDirect Link |
Meng, B., 2011. Refinement of mechanized proof of security properties of remote internet voting protocol in applied PI calculus with proverif. Inform. Technol. J., 10: 293-334. CrossRefDirect Link |
Meng, B., W. Huang and J. Qin, 2010. Automatic verification of security properties of remote internet voting protocol in symbolic model. Inform. Technol. J., 9: 1521-1556. CrossRefDirect Link |
Citation to this article as recorded by
Automatic verification of security properties of remote internet voting protocol in symbolic model. Information Technology Journal Vol. 9, Issue 8, 1521, 2010 |
Automated Proof of Resistance of Denial of Service Attacks in Remote Internet Voting Protocol with Extended Applied Pi Calculus Information Technology Journal Vol. 10, Issue 8, 1468, 2011 |
Refinement of mechanized proof of security properties of remote internet voting protocol in applied PI calculus with proverif. Information Technology Journal Vol. 10, Issue 2, 293, 2011 |
How to cite this article
Jia Mei, Huaikou Miao and Pan Liu, 2009. Applying SMV for Security Protocol Verification. Information Technology Journal, 8: 1065-1070.
DOI: 10.3923/itj.2009.1065.1070
URL: https://scialert.net/abstract/?doi=itj.2009.1065.1070
DOI: 10.3923/itj.2009.1065.1070
URL: https://scialert.net/abstract/?doi=itj.2009.1065.1070