共 50 条
- [2] Using Backward Induction Techniques in (Timed) Security Protocols Verification [J]. COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 265 - 276
- [4] Automated Verification of Timed Security Protocols with Clock Drift [J]. FM 2016: FORMAL METHODS, 2016, 9995 : 513 - 530
- [5] Timed Interpreted Systems as a New Agent-Based Formalism for Verification of Timed Security Protocols [J]. Applied Sciences (Switzerland), 2024, 14 (22):
- [6] Group Anonymity in Security Protocols [J]. PROCEEDINGS OF THE 2018 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2018, : 407 - 416
- [7] Complexity of Anonymity for Security Protocols [J]. COMPUTER SECURITY-ESORICS 2010, 2010, 6345 : 558 - 572
- [8] Timed Analysis of Security Protocols [J]. INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY - ISAT 2016 - PT II, 2017, 522 : 53 - 63
- [9] Timed analysis of security protocols [J]. JOURNAL OF COMPUTER SECURITY, 2007, 15 (06) : 619 - 645
- [10] Verification of Security Protocols [J]. VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, 2009, 5403 : 5 - 13