- Bochmann, G. V., Logical Verification and Implementation of Protocols, Proceedings of the Fourth Data Communications Symp., Quebec City, Canada, October 1975, pp. 7/15--20. (IEEE)Google Scholar
- Bochmann, G. V., Finite State Description of Communication Protocols, this Proceedings.Google Scholar
- Bochmann, G. V., Chung, R. J., A Formalized Specification of HDLC Classes of Procedures, Proc. National Telecommunications Conf., Los Angeles, December 1977, pp. 3A2/1--11. (IEEE)Google Scholar
- Bochmann, G. V., Gecsei, J., A Unified Method for the Specification and Verification of Protocols, Proc. of IFIP Congress, Toronto, Canada, August 1977, pp. 229--234.Google Scholar
- Brand, D. and Joyner, W. H., Verification of Protocols Using Symbolic Execution, this Proceedings.Google Scholar
- Danthine, A., Bremer, J., An Axiomatic Description of the Transport Protocol of CYCLADES, Professional Conference on Computer Networks and Teleprocessing, Aachen, 1976, pp. 259--273. (Springer-Verlag) Google ScholarDigital Library
- Danthine, A., Bremer, J., Modelling and Verification of End-to-End Transport Protocols, this Proceedings.Google Scholar
- Good, Donald I., Constructing Verified and Reliable Communications Processing Systems, ACM SIGSOFT Software Engineering Notes 2, 5, October 1977, pp. 8--13. Google ScholarDigital Library
- Gouda, Mohamed G., Manning, Eric G., On the Modelling, Analysis, and Design of Protocols--A Special Class of Software Structures, Proc. 2nd Int. Conf. on Software Engineering, October 1976, pp. 256--262. Google ScholarDigital Library
- Hajek, Jan, Automatically Verified Data Transfer Protocols, Eindhoven University of Technology, Eindhoven, The Netherlands, November 1977.Google Scholar
- Harangozo, J., Protocol Definition with Formal Grammars, this Proceedings.Google Scholar
- LeLann, G., Verification and Evaluation of Communication Protocols, to be published in Computer Networks Journal.Google Scholar
- Merlin, P. M., A Methodology for the Design and Implementation of Communication Protocols, IEEE Trans. Comm. COM-24, 6, June 1976, pp. 614--621.Google ScholarCross Ref
- Postel, J. B., Farber, D., Graph Modeling of Computer Communications Protocols, Proc. 5th Texas Conf. on Computing Systems, Austin, Texas, October 1976, pp. 66--77.Google Scholar
- Rudin, H., West, C. H., and Zafiropulo, P., Automated Protocol, Validation: One Chain of Development, this Proceedings.Google Scholar
- Stenning, N. V., A Data Transfer Protocol, Computer Networks, Vol. 1, No. 2, September 1976. (North Holland)Google Scholar
- Sundstrom, R. J., Formal Definition of IBM's System Network Architecture, Proc. National Telecommunications Conf., Los Angeles, California, December 1977. (IEEE)Google Scholar
- Sunshine, C. A., Survey of Communication Protocol Verification Techniques, Proc. Symp. Computer Networks, NBS, Gaithersburg, Maryland, November 1976, pp. 24--26. (IEEE)Google Scholar
- Symons, F. J. W., The Application of Numerical Petri Nets to the Analysis of Communication Protocols and Signalling Systems, Telecomm. Group Report 141, Dept. of EE, Univ. of Essex, England, May 1977.Google Scholar
Index Terms
- Survey of protocol definition and verification techniques
Recommendations
A Survey of Oblivious Transfer Protocol
Oblivious transfer (OT) protocol is an essential tool in cryptography that provides a wide range of applications such as secure multi-party computation, private information retrieval, private set intersection, contract signing, and privacy-preserving ...
Protocol Verification via Projections
The method of projections is a new approach to reduce the complexity of analyzing nontrivial communication protocols. A protocol system consists of a network of protocol entities and communication channels. Protocol entities interact by exchanging ...
Comments