共 50 条
- [21] Proof Theory and Decision Procedures for Deontic STIT Logics Journal of Artificial Intelligence Research, 2024, 81 : 837 - 876
- [22] A new method for testing decision procedures in modal logics AUTOMATED DEDUCTION - CADE-14, 1997, 1249 : 264 - 267
- [24] Key substitution in the symbolic analysis of cryptographic protocols FSTTCS 2007: FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE, PROCEEDINGS, 2007, 4855 : 121 - 132
- [25] Honest functions and their application to the analysis of cryptographic protocols Proceedings of the Computer Security Foundations Workshop, 1999, : 83 - 89
- [26] Performance analysis of cryptographic protocols on handheld devices THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2004, : 169 - 174
- [27] Algebra model and security analysis for cryptographic protocols SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (02): : 199 - 220
- [29] CRYPTOBAP: A Binary Analysis Platform for Cryptographic Protocols PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1362 - 1376
- [30] Formal analysis and design principles of cryptographic protocols Nanjing Youdian Xueyuan Xuebao/Journal of Nanjing Institute of Posts and Telecommunications, 2001, 21 (03):