共 50 条
- [1] Formal analysis and design principles of cryptographic protocols [J]. Nanjing Youdian Xueyuan Xuebao/Journal of Nanjing Institute of Posts and Telecommunications, 2001, 21 (03):
- [2] Collusion analysis of cryptographic protocols [J]. IEEE GLOBECOM 1996 - CONFERENCE RECORD, VOLS 1-3: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 1 - 5
- [4] Protocol engineering principles for cryptographic protocols design [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 641 - +
- [5] Symbolic trace analysis of cryptographic protocols [J]. AUTOMATA LANGUAGES AND PROGRAMMING, PROCEEDING, 2001, 2076 : 667 - 681
- [6] Some applications of polynomials for the design of cryptographic protocols [J]. SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 1 - 13
- [7] Non interference for the analysis of cryptographic protocols [J]. AUTOMATA LANGUAGES AND PROGRAMMING, 2000, 1853 : 354 - 372
- [8] Cryptographic Protocols Analysis in Event B [J]. PERSPECTIVES OF SYSTEMS INFORMATICS, 2010, 5947 : 282 - +
- [10] A Performance Analysis Model for Cryptographic Protocols [J]. ICSIT 2011: THE 2ND INTERNATIONAL CONFERENCE ON SOCIETY AND INFORMATION TECHNOLOGIES, 2011, : 80 - 85