Analysing Security Protocols Using Refinement in iUML-B (BiBTeX)
@InProceedings{snook17:_analy_secur_protoc_using_refin_b,
author = {Colin Snook and Thai Son Hoang and Michael Butler},
title = {Analysing Security Protocols Using Refinement in {iUML-B}},
pages = {84--98},
crossref = {barrett17:_nasa_formal_method_inter_sympos_nfm},
doi = {10.1007/978-3-319-57288-8_6},
url = {http://doi.org/10.1007/978-3-319-57288-8_6},
note = {Available at \url{http://doi.org/10.1007/978-3-319-57288-8_6}}
}
@Proceedings{barrett17:_nasa_formal_method_inter_sympos_nfm,
title = {{NASA} Formal Methods - 9th International Symposium, {NFM} 2017},
year = 2017,
editor = {Clark Barrett and Misty Davies and Temesghen Kahsai},
volume = 10227,
series = {Lecture Notes in Computer Science},
address = {Moffett Field, CA, USA},
month = may,
publisher = {Springer},
doi = {10.1007/978-3-319-57288-8},
url = {http://doi.org/10.1007/978-3-319-57288-8},
note = {Available at \url{http://doi.org/10.1007/978-3-319-57288-8}}
}