共 50 条
- [21] An extension of typed MSR for specifying esoteric protocols and their Dolev-Yao intruder [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2005, 175 : 209 - 221
- [22] A cryptographically sound Dolev-Yao style security proof of an electronic payment system [J]. 18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2005, : 78 - 93
- [23] Formalization in PVS of Balancing Properties Necessary for Proving Security of the Dolev-Yao Cascade Protocol Model [J]. JOURNAL OF FORMALIZED REASONING, 2013, 6 (01): : 31 - 61
- [24] A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol [J]. COMPUTER SECURITY ESORICS 2004, PROCEEDINGS, 2004, 3193 : 89 - 108
- [27] Security Analysis of a Key Exchange Protocol under Dolev-Yao Threat Model Using Tamarin Prover [J]. 2022 IEEE 12TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2022, : 667 - 672
- [28] Limits of the cryptographic realization of Dolev-Yao-style XOR [J]. COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, 2005, 3679 : 178 - 196
- [30] Limits of the BRSIM/UC soundness of Dolev–Yao-style XOR [J]. International Journal of Information Security, 2008, 7 : 33 - 54