共 50 条
- [32] Formal Security Analysis of Authentication in SNMPv3 Protocol by An Automated Tool [J]. 2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 1060 - 1064
- [33] An analysis of the Manufacturing Messaging Specification protocol [J]. UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2008, 5061 : 602 - +
- [36] On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis [J]. 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, : 498 - 505
- [37] Formal modeling and analysis of security schemes of RPL protocol using colored Petri nets [J]. PLOS ONE, 2023, 18 (08):
- [38] Integration and formal security analysis of a quantum key distribution scheme within CHAP protocol [J]. 2015 IEEE/ACS 12TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2015,
- [40] The Security Analysis of Popular Instant Messaging Applications [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS, ELECTRONICS AND CONTROL (ICCSEC), 2017, : 1324 - 1328