共 50 条
- [1] Verified reference implementations of WS-security protocols [J]. WEB SERVICES AND FORMAL METHODS, PROCEEDINGS, 2006, 4184 : 88 - 106
- [2] Sound Verification of Security Protocols: From Design to Interoperable Implementations [J]. 2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 1077 - 1093
- [3] Provable implementations of security protocols [J]. 21ST ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2006, : 345 - 346
- [4] Verifying Implementations of Security Protocols by Refinement [J]. VERIFIED SOFTWARE: THEORIES, TOOLS, EXPERIMENTS, 2012, 7152 : 50 - +
- [5] Bulwark: Holistic and Verified Security Monitoring of Web Protocols [J]. COMPUTER SECURITY - ESORICS 2020, PT I, 2020, 12308 : 23 - 41
- [7] AnBx: Automatic generation and verification of security protocols implementations [J]. Lect. Notes Comput. Sci., (156-173):
- [8] AnBx: Automatic Generation and Verification of Security Protocols Implementations [J]. FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 156 - 173
- [10] Introduction to the special session on wireless protocols security & hardware implementations [J]. MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 757 - 758