共 50 条
- [3] Automated Verification of Timed Security Protocols with Clock Drift [J]. FM 2016: FORMAL METHODS, 2016, 9995 : 513 - 530
- [4] On Backward-Style Verification for Timed Anonymity of Security Protocols [J]. 2016 IEEE 5TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS, 2016,
- [5] Using Backward Induction Techniques in (Timed) Security Protocols Verification [J]. COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 265 - 276
- [6] Timed Analysis of Security Protocols [J]. INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY - ISAT 2016 - PT II, 2017, 522 : 53 - 63
- [7] Timed analysis of security protocols [J]. JOURNAL OF COMPUTER SECURITY, 2007, 15 (06) : 619 - 645
- [8] TAuth: Verifying Timed Security Protocols [J]. FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2014, 2014, 8829 : 300 - 315
- [9] Verifying Parameterized Timed Security Protocols [J]. FM 2015: FORMAL METHODS, 2015, 9109 : 342 - 359
- [10] On the Verification of Detectability for Timed Systems [J]. 2022 AMERICAN CONTROL CONFERENCE, ACC, 2022, : 3752 - 3758