Loïc Hélouët Distributed system requirement modeling with message sequence charts: the case of the RMTP2 protocol. [Citation Graph (0, 0)][DBLP] Information & Software Technology, 2003, v:45, n:11, pp:701-714 [Journal]
Reinhard Gotzhein Consolidating and applying the SDL-pattern approach: a detailed case study. [Citation Graph (0, 0)][DBLP] Information & Software Technology, 2003, v:45, n:11, pp:727-741 [Journal]
John Mullins, Stéphane Lafrance Bisimulation-based non-deterministic admissible interference and its application to the analysis of cryptographic protocols. [Citation Graph (0, 0)][DBLP] Information & Software Technology, 2003, v:45, n:11, pp:779-790 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP