共 50 条
- [21] Formal verification of cryptographic protocols: A survey ADVANCES IN CRYPTOLOGY - ASIACRYPT '94, 1995, 917 : 135 - 150
- [22] Cryptographic Protocols for Confidentiality, Authenticity and Privacy on Constrained Devices 2020 12TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT 2020), 2020, : 87 - 92
- [23] Type-Based Verification of Connectivity Constraints in Lattice Surgery PROGRAMMING LANGUAGES AND SYSTEMS, APLAS 2024, 2025, 15194 : 216 - 237
- [26] Integrating verification, testing, and learning for cryptographic protocols INTEGRATED FORMAL METHODS, PROCEEDINGS, 2007, 4591 : 538 - 557
- [27] Tidy: Symbolic Verification of Timed Cryptographic Protocols PROCEEDINGS OF THE 2022 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2022, 2022, : 263 - 276
- [28] Verification of cryptographic protocols: Tagging enforces termination FOUNDATIONS OF SOFTWARE SCIENCE AND COMPUTATION STRUCTURES, PROCEEDINGS, 2003, 2620 : 136 - 152
- [29] Automated Verification Of Cryptographic Protocol Implementations 12TH INTERNATIONAL CONFERENCE ON THE DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2019), 2019, : 849 - 854
- [30] Automatic verification of time sensitive cryptographic protocols TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PROCEEDINGS, 2004, 2988 : 342 - 356