共 50 条
- [44] Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs for RFID Systems [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2017, 2018, 10779 : 267 - 283
- [45] Knowledge Based Approach for Mechanically Verifying Security Protocols [J]. 19TH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI-05), 2005, : 1572 - 1573
- [46] A bound on attacks on authentication protocols [J]. FOUNDATIONS OF INFORMATION TECHNOLOGY IN THE ERA OF NETWORK AND MOBILE COMPUTING, 2002, 96 : 588 - 600
- [47] Environmental requirements for authentication protocols [J]. SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 339 - 355
- [48] Privacy and authentication protocols for PCS [J]. IEEE PERSONAL COMMUNICATIONS, 1996, 3 (05): : 34 - 38
- [49] Lightweight VANET Authentication Protocols [J]. 37TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2022, : 1975 - 1978
- [50] Verifying authentication protocols with CSP [J]. 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 3 - 17