next up previous
Up: Two Weak Links in Previous: Two Weak Links in


M. Burrows, M. Abadi, and R. Needham.
A logic of authentication.
ACM Transactions on Computer Systems, 8(1):18-36, 1990.

Dunca Clarke.
Testing Real-Time Constraints.
PhD thesis, Department of Computer and Information Science, The University of Pennsylvania, Philadelphia, PA 19104, Dec 1996.

Duncan Clarke and Insup Lee.
The Modular Specification and Analysis of an ATM Switching System Using a Process Algebra.
In Proc. International Test Conference, Oct 1996.

Duncan Clarke and Insup Lee.
Automatic Test Generation for the Analysis of a Real-Time System: Case Study.
In IEEE Real-Time Technology and Applications, pages 112-124, 1997.

James Gosling, Bill Joy, and Guy Steele.
The Java Language Specification.
Addison Wesley, 1996.

I. Lee, P. Brémond-Grégoire, and R. Gerber.
A Process Algebraic Approach to the Specification and Analysis of Resource-Bound Real-Time Systems.
Proceedings of the IEEE, pages 158-171, Jan 1994.

Tim Lindholm and Frank Yellin.
The Java Virtual Machine Specification.
Addison Wesley, 1996.

G. Lowe.
An attack on the Needham-Schroeder public key protocol.
Information Processing Letters, 56:131-133, 1995.

C.A. Meadows.
Analyzing the Needham-Schroeder public key protocol: A comparison of two approaches.
In Proc. of ESORICS. Springer Verlag, 1996.

Robin Milner, Mads Tofte, and Robert Harper.
The Definition of Standard ML.
The MIT Press, 1990.

R.M. Needham and M.D. Schroeder.
Using encryption for authentication in large networks of computers.
Communications of the ACM, 21(12):993-999, 1978.

D. Syme.
Reasoning with the formal definition of Standard ML in HOL.
In J. Joyce and C. Seger, editors, Higher Order Logic Theorem Proving and Its Applications, volume 780 of Lecture Notes in Computer Science, pages 43-60. Springer-Verlag, February 1994.

Myra VanInwegen.
The Machine-Assisted Proof of Programming Language Properties.
PhD thesis, University of Pennsylvania, 1996.

M. Yannakakis and D. Lee.
Testing finite state machines: Fault detection.
Journal of Computer and System Sciences, 50, 1995.