共 50 条
- [1] A Formal Description and Verification of Authentication Protocol [J]. DCABES 2008 PROCEEDINGS, VOLS I AND II, 2008, : 735 - 740
- [2] Formal Verification of a Secure Mobile Banking Protocol [J]. ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 410 - 421
- [3] FORMAL VERIFICATION OF THE SECURE SOCKETS LAYER PROTOCOL [J]. ICEIS 2008: PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL ISAS-2: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, VOL 2, 2008, : 246 - 252
- [4] Design and Formal Verification of a VANET Lightweight Authentication Protocol [J]. 2018 IEEE 18TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2018, : 513 - 517
- [5] Communication space reduction for formal verification of secure authentication protocols [J]. THIRD INTERNATIONAL WORKSHOP ON ADVANCED ISSUES OF E-COMMERCE AND WEB-BASED INFORMATION SYSTEMS, PROCEEDINGS, 2001, : 225 - 227
- [6] Formal Verification of Secure Authentication in Wireless Mesh Network (SAWMN) [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 3, 2016, 381 : 375 - 388
- [8] Formal Verification of Cryptographic Protocol for Secure RFID System [J]. NCM 2008: 4TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, VOL 2, PROCEEDINGS, 2008, : 470 - 477
- [9] Formal verification of secondary authentication protocol for 5G secondary authentication [J]. International Journal of Security and Networks, 2021, 16 (04): : 223 - 234
- [10] Formal verification of IEEE 802.11w authentication protocol [J]. 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING & SECURITY [ICCCS-2012], 2012, 1 : 716 - 722