共 50 条
- [31] Constraint abstraction in verification of security protocols FRONTIERS IN ALGORITHMICS, 2008, 5059 : 252 - +
- [32] External consistency and the verification of security protocols SECURITY PROTOCOLS, 1999, 1550 : 24 - 35
- [33] A tool for lazy verification of security protocols 16TH ANNUAL INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2001), PROCEEDINGS, 2001, : 373 - 376
- [34] A Verification Framework for Stateful Security Protocols FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2017, 2017, 10610 : 262 - 280
- [35] Using Interpolation for the Verification of Security Protocols SECURITY AND TRUST MANAGEMENT, STM 2013, 2013, 8203 : 99 - 114
- [38] On computer-assisted verification of timed anonymity of multi-agent systems 2016 4TH INTL CONF ON APPLIED COMPUTING AND INFORMATION TECHNOLOGY/3RD INTL CONF ON COMPUTATIONAL SCIENCE/INTELLIGENCE AND APPLIED INFORMATICS/1ST INTL CONF ON BIG DATA, CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (ACIT-CSII-BCD), 2016, : 307 - 312
- [39] Formal analysis of some timed security properties in wireless protocols FORMAL METHODS FOR OPEN OBJECT-BASED DISTRIBUTED SYSTEMS, PROCEEDINGS, 2003, 2884 : 139 - 154
- [40] Formal Verification of Security Protocols: ProVerif and Extensions ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT II, 2022, 13339 : 500 - 512