共 50 条
- [41] CVS: a compiler for the analysis of cryptographic protocols [J]. PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, : 203 - 212
- [42] New analysis method of cryptographic protocols [J]. Jisuanji Gongcheng/Computer Engineering, 2001, 27 (03):
- [43] Model Driven Security Analysis of IDaaS Protocols [J]. SERVICE-ORIENTED COMPUTING, 2011, 7084 : 312 - 327
- [45] Mechanizing the Proof of Adaptive, Information-theoretic Security of Cryptographic Protocols in the Random Oracle Model [J]. 2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 83 - 99
- [46] A Study on Fine-Grained Security Properties of Cryptographic Protocols for Formal Analysis Method with Reasoning [J]. 2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, : 210 - 215
- [47] Model-based testing of cryptographic protocols [J]. TRUSTWORTHY GLOBAL COMPUTING, 2005, 3705 : 33 - 60
- [50] Tracking Security Flaws in Cryptographic Protocols Using Witness-Functions [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2015): BIG DATA ANALYTICS FOR HUMAN-CENTRIC SYSTEMS, 2015, : 1189 - 1196