共 50 条
- [21] Cryptographic protocol security analysis based on bounded constructing algorithm Science in China Series F, 2006, 49 : 26 - 47
- [22] Cryptographic protocol engineering: Building security from the ground up IC'2000: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, 2000, : 371 - 377
- [23] Cryptographic protocol security analysis based on bounded constructing algorithm SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2006, 49 (01): : 26 - 47
- [25] Formal verification method for cryptographic software security based on Hoare logic Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2019, 49 (04): : 1301 - 1306
- [27] A cryptographic model for branching time security properties - The case of contract signing protocols COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 422 - 437
- [28] Java and Security Evolving The Security Model Proceedings of the Symposium on Network and Distributed System Security, NDSS 1997, 1997,
- [29] Security analysis of security protocol Swift implementations based on computational model Tongxin Xuebao/Journal on Communications, 2018, 39 (09): : 178 - 190
- [30] Security on your hand: Secure filesystems with a "non-cryptographic" JAVA']JAVA-ring JAVA ON SMART CARDS: PROGRAMMING AND SECURITY, 2001, 2041 : 151 - 162