Analysing Security Protocols Using Refinement in iUML-B (BiBTeX)

@InProceedings{snook17:_analy_secur_protoc_using_refin_b,
  author = 	 {Colin Snook and Thai Son Hoang and Michael Butler},
  title = 	 {Analysing Security Protocols Using Refinement in {iUML-B}},
  pages = 	 {84--98},
  crossref = 	 {barrett17:_nasa_formal_method_inter_sympos_nfm},
  doi = 	 {10.1007/978-3-319-57288-8_6},
  url = 	 {http://doi.org/10.1007/978-3-319-57288-8_6},
  note = 	 {Available at \url{http://doi.org/10.1007/978-3-319-57288-8_6}}
}

@Proceedings{barrett17:_nasa_formal_method_inter_sympos_nfm,
  title = 	 {{NASA} Formal Methods - 9th International Symposium, {NFM} 2017},
  year = 	 2017,
  editor = 	 {Clark Barrett and Misty Davies and Temesghen Kahsai},
  volume = 	 10227,
  series = 	 {Lecture Notes in Computer Science},
  address = 	 {Moffett Field, CA, USA},
  month = 	 may,
  publisher = 	 {Springer},
  doi = 	 {10.1007/978-3-319-57288-8},
  url = 	 {http://doi.org/10.1007/978-3-319-57288-8},
  note = 	 {Available at \url{http://doi.org/10.1007/978-3-319-57288-8}}
}
  


 
This web page is written using Aquamacs. Last modified: Sat Nov 18 08:16:22 GMT 2017
by Thai Son Hoang
top