共 50 条
- [41] Untraceable Analysis of Scalable RFID Security Protocols [J]. Wireless Personal Communications, 2019, 109 : 1747 - 1767
- [42] VANET authentication protocols: security analysis and a proposal [J]. The Journal of Supercomputing, 2023, 79 : 2153 - 2179
- [43] Automated analysis of security protocols with global state [J]. 2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 163 - 178
- [44] Quantitative analysis of security protocols in wireless networks [J]. IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 290 - 291
- [45] Security analysis of IoT protocols: A focus in CoAP [J]. 2016 3RD MEC INTERNATIONAL CONFERENCE ON BIG DATA AND SMART CITY (ICBDSC), 2016, : 172 - 178
- [46] A simple process calculus for the analysis of security protocols [J]. PDCAT 2005: Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, Proceedings, 2005, : 110 - 114
- [47] Security and Forensic Analysis for Industrial Ethernet Protocols [J]. 2022 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON22), 2022, : 63 - 65
- [48] On Some Time Aspects in Security Protocols Analysis [J]. COMPUTER NETWORKS, CN 2018, 2018, 860 : 344 - 356
- [49] On the automatic analysis of recursive security protocols with XOR [J]. STACS 2007, PROCEEDINGS, 2007, 4393 : 646 - +
- [50] Algebra model and security analysis for cryptographic protocols [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (02): : 199 - 220