共 50 条
- [41] Secure Embedded Architectures: Taint Properties Verification 2016 13TH INTERNATIONAL CONFERENCE ON DEVELOPMENT AND APPLICATION SYSTEMS (DAS 2016), 2016, : 150 - 157
- [42] Secure Motion Verification using the Doppler Effect PROCEEDINGS OF THE 9TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC'16), 2016, : 135 - 145
- [43] Source code verification of a secure payment applet JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2004, 58 (1-2): : 107 - 120
- [45] Logical verification of secure electronic transactions protocol Ruan Jian Xue Bao/Journal of Software, 2000, 11 (03): : 346 - 362
- [46] FORMAL VERIFICATION OF THE SECURE SOCKETS LAYER PROTOCOL ICEIS 2008: PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL ISAS-2: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, VOL 2, 2008, : 246 - 252
- [47] Formal Verification of a Secure Mobile Banking Protocol ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 410 - 421
- [49] Secure Accountable Dynamic Storage Integrity Verification 2021 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, INTERNET OF PEOPLE, AND SMART CITY INNOVATIONS (SMARTWORLD/SCALCOM/UIC/ATC/IOP/SCI 2021), 2021, : 440 - 447
- [50] Efficient and secure fingerprint verification for embedded devices Eurasip Journal on Applied Signal Processing, 2006, 2006