СТ |
Experiences with the Application of Symbolic Model Checking to the Analysis of Software Specifications |
2000 |
Anderson R. J., Beame P., Chan W., Notkin D. |
|
|
|
Lecture Notes in Computer Science |
18.02.2000 |
СТ |
Improving Efficiency of Symbolic Model Checking for State-Based System Requirements |
1998 |
Chan W., Anderson R. J., Beame P., Notkin D. |
|
|
|
Software Engineering Notes |
30.07.1998 |
СТ |
Why Cryptosystems Fail |
1994 |
Anderson R. J. |
|
|
|
Communications of the ACM |
14.12.1994 |
СТ |
Liability and Computer Security: Nine Principles |
1994 |
Anderson R. J. |
|
|
|
Lecture Notes in Computer Science |
06.12.1994 |
СТ |
UEPS - A Second Generation Electronic Wallet |
1992 |
Anderson R. J. |
|
|
|
Lecture Notes in Computer Science |
24.12.1992 |