共 50 条
- [1] Modeling of Wireless Network Security Authentication Protocol Based on SPIN INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3, 2013, 336-338 : 1892 - 1897
- [2] Network Protocol Security Testing Based on Fuzz PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015), 2015, : 955 - 958
- [3] Modeling and Verifying the Ariadne Protocol Using CSP 2012 IEEE 19TH INTERNATIONAL CONFERENCE AND WORKSHOPS ON ENGINEERING OF COMPUTER BASED SYSTEMS (ECBS), 2012, : 24 - 32
- [5] Formal modeling and security analysis method of security protocol based on CPN Tongxin Xuebao/Journal on Communications, 2021, 42 (09): : 240 - 253
- [6] SPIN-based security protocol modeling and analysis Nanjing Hangkong Hangtian Daxue Xuebao/Journal of Nanjing University of Aeronautics and Astronautics, 2009, 41 (05): : 672 - 676
- [8] Security authentication protocol for WiMAX wireless network based on protocol composition logic Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2010, 32 (09): : 2106 - 2111
- [9] Modeling and Verifying the TTCAN Protocol Using Timed CSP 2014 THEORETICAL ASPECTS OF SOFTWARE ENGINEERING CONFERENCE (TASE), 2014, : 90 - 97
- [10] A new security protocol modeling approach based on πt calculus Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2010, 47 (04): : 613 - 620