↓ Skip to main content

Formal Techniques for Networked and Distributed Systems – FORTE 2008

Overview of attention for book
Cover of 'Formal Techniques for Networked and Distributed Systems – FORTE 2008'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Model Generation for Horn Logic with Stratified Negation
  3. Altmetric Badge
    Chapter 2 Counterexample Guided Spotlight Abstraction Refinement
  4. Altmetric Badge
    Chapter 3 An Experimental Evaluation of Probabilistic Simulation
  5. Altmetric Badge
    Chapter 4 An SMT Approach to Bounded Reachability Analysis of Model Programs
  6. Altmetric Badge
    Chapter 5 Parameterized Tree Systems
  7. Altmetric Badge
    Chapter 6 Adapting Petri Nets Reductions to Promela Specifications
  8. Altmetric Badge
    Chapter 7 Verification of a Hierarchical Generic Mutual Exclusion Algorithm
  9. Altmetric Badge
    Chapter 8 Distributed Semantics and Implementation for Systems with Interaction and Priority
  10. Altmetric Badge
    Chapter 9 Checking Correctness of Transactional Behaviors
  11. Altmetric Badge
    Chapter 10 Specifying and Verifying Web Transactions
  12. Altmetric Badge
    Chapter 11 Formal Techniques for Networked and Distributed Systems – FORTE 2008
  13. Altmetric Badge
    Chapter 12 Program Repair Suggestions from Graphical State-Transition Specifications
  14. Altmetric Badge
    Chapter 13 Verifying Erlang Telecommunication Systems with the Process Algebra μCRL
  15. Altmetric Badge
    Chapter 14 NQSL - Formal Language and Tool Support for Network Quality-of-Service Requirements
  16. Altmetric Badge
    Chapter 15 Timed Mobile Ambients for Network Protocols
  17. Altmetric Badge
    Chapter 16 A Specification Framework for Earth-Friendly Logistics
  18. Altmetric Badge
    Chapter 17 A Hierarchy of Equivalences for Probabilistic Processes
  19. Altmetric Badge
    Chapter 18 Multiset Bisimulations as a Common Framework for Ordinary and Probabilistic Bisimulations
  20. Altmetric Badge
    Chapter 19 Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning
  21. Altmetric Badge
    Chapter 20 Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol
  22. Altmetric Badge
    Chapter 21 Protocol Modeling with Model Program Composition
Attention for Chapter 20: Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol
Altmetric Badge

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
7 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol
Chapter number 20
Book title
Formal Techniques for Networked and Distributed Systems – FORTE 2008
Published by
Springer, Berlin, Heidelberg, June 2008
DOI 10.1007/978-3-540-68855-6_20
Book ISBNs
978-3-54-068854-9, 978-3-54-068855-6
Authors

Wei Wang, Dongyao Ji

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 7 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 7 100%

Demographic breakdown

Readers by professional status Count As %
Researcher 2 29%
Other 2 29%
Student > Ph. D. Student 1 14%
Student > Master 1 14%
Unknown 1 14%
Readers by discipline Count As %
Computer Science 4 57%
Pharmacology, Toxicology and Pharmaceutical Science 1 14%
Materials Science 1 14%
Unknown 1 14%