2015
DOI: 10.1049/cje.2015.10.002
|View full text |Cite
|
Sign up to set email alerts
|

LTL Formulae to Buchi Automata Translation Using on‐the‐Fly De‐generalization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…2) Security properties description Linear temporal logic (LTL) [10,11] formulas are used to describe the security properties which should be satisfied by the improved protocol. If any properties of the protocol are violated while checking the model by SPIN, it denotes that a security vulnerabilities has been found in this protocol, and the error trail will be printed by SPIN.…”
Section: Building Promela Modelmentioning
confidence: 99%
“…2) Security properties description Linear temporal logic (LTL) [10,11] formulas are used to describe the security properties which should be satisfied by the improved protocol. If any properties of the protocol are violated while checking the model by SPIN, it denotes that a security vulnerabilities has been found in this protocol, and the error trail will be printed by SPIN.…”
Section: Building Promela Modelmentioning
confidence: 99%