Verifying a Hotel Key Card System
- 1 January 2006
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 5 references indexed in Scilit:
- Bounded Model Generation for Isabelle/HOLElectronic Notes in Theoretical Computer Science, 2005
- Random testing in Isabelle/HOLPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Structured Proofs in Isar/HOLLecture Notes in Computer Science, 2003
- Isabelle/HOLLecture Notes in Computer Science, 2002
- The inductive approach to verifying cryptographic protocolsJournal of Computer Security, 1998