共 50 条
- [1] Breaking and Fixing the HB plus DB protocol PROCEEDINGS OF THE 10TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC 2017), 2017, : 241 - 246
- [2] Verification of protocol design using UML - SMV World Academy of Science, Engineering and Technology, 2009, 36 : 544 - 548
- [3] Breaking and fixing the Needham-Schroeder public-key protocol using FDR SOFTWARE-CONCEPTS AND TOOLS, 1996, 17 (03): : 93 - 102
- [4] Using SMV for cryptographic protocol analysis: A case study Operating Systems Review (ACM), 2001, 35 (02): : 43 - 50
- [5] Using SMV for cryptographic protocol analysis: A case study FCS '05: Proceedings of the 2005 International Conference on Foundations of Computer Science, 2005, : 150 - 153
- [6] Reversing, Breaking, and Fixing the French Legislative Election E-Voting Protocol PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 6737 - 6752
- [7] Breaking and Fixing Vote Privacy of the Estonian E-Voting Protocol IVXV FINANCIAL CRYPTOGRAPHY AND DATA SECURITY. FC 2022 INTERNATIONAL WORKSHOPS, 2023, 13412 : 325 - 334
- [10] Automated verification of a randomized distributed consensus protocol using cadence SMV and PRISM COMPUTER AIDED VERIFICATION, PROCEEDINGS, 2001, 2102 : 194 - 206