共 50 条
- [41] Decision procedures for the analysis of cryptographic protocols by logics of belief [J]. PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, : 44 - 54
- [42] Decidable analysis of cryptographic protocols with products and modular exponentiation [J]. PROGRAMMING LANGUAGES AND SYSTEMS, 2004, 2986 : 355 - 369
- [43] Automated analysis of cryptographic protocols using Mur phi [J]. 1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, : 141 - 151
- [45] Symbolic Analysis of Cryptographic Protocols Containing Bilinear Pairings [J]. 2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 63 - 77
- [46] Logic-based formal analysis of cryptographic protocols [J]. ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 300 - +
- [47] A problem solving mechanism for formal analysis of cryptographic Protocols [J]. NEW ADVANCES IN SIMULATION, MODELLING AND OPTIMIZATION (SMO '07), 2007, : 95 - 98
- [48] Automata-based analysis of recursive cryptographic protocols [J]. STACS 2004, PROCEEDINGS, 2004, 2996 : 382 - 393
- [49] Decision procedures for the analysis of cryptographic protocols by logics of belief [J]. Proceedings of the Computer Security Foundations Workshop, 1999, : 44 - 54
- [50] Comparative Analysis of Multi-round Cryptographic Primitives based Lightweight Authentication Protocols for RFID-Sensor Integrated MANETs [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2019, 14 (01): : 1 - 10