共 50 条
- [2] A formal Modeling method based on CPN [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-6, PROCEEDINGS, 2006, : 4994 - +
- [3] A reduction method for verification of security protocol through CPN [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 73 - 77
- [4] Formal Security Analysis of the MaCAN Protocol [J]. INTEGRATED FORMAL METHODS, IFM 2014, 2014, 8739 : 241 - 255
- [5] On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis [J]. 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, : 498 - 505
- [8] A Security Analysis Method for Security Protocol Implementations Based on Message Construction [J]. APPLIED SCIENCES-BASEL, 2018, 8 (12):
- [9] Formal Procedural Security Modeling and Analysis [J]. CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 249 - +
- [10] A Formal Security Analysis of the Signal Messaging Protocol [J]. 2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, : 451 - 466