您当前的位置:
首页 >
文章列表页 >
Model checking of trusted cryptographic module
更新时间:2024-10-14
    • Model checking of trusted cryptographic module

    • Vol. 31, Issue 1, Pages: 59-64(2010)
    • CLC: TP393.08
    • Published:2010

    移动端阅览

  • CHEN Xiao-feng, FENG Deng-guo. Model checking of trusted cryptographic module[J]. 2010, 31(1): 59-64. DOI:

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

873

下载量

1

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Locality-guided based optimization method for bounded model checker
Modeling and verifying based on timed automata of Internet of things gateway security system
Composable information flow verification for service chain based on model checking

Related Author

Shun WANG
Ye DU
Zhen HAN
Jiqiang LIU
Guoqing WANG
Lei ZHUANG
Ruimin WANG
Yu SONG

Related Institution

Beijing Key Laboratory of Security and Privacy in Intelligent Transportation,Beijing Jiaotong University
School of Information Engineering, Zhengzhou University
School of Computer Science and Technology,Xidian University
0