共 50 条
- [2] SeVe: automatic tool for verification of security protocols [J]. Frontiers of Computer Science, 2012, 6 : 57 - 75
- [3] HERMES:: An automatic tool for verification of secrecy in security protocols [J]. COMPUTER AIDED VERIFICATION, 2003, 2725 : 219 - 222
- [4] The Scyther tool: Verification, falsification, and analysis of security protocols [J]. COMPUTER AIDED VERIFICATION, 2008, 5123 : 414 - 418
- [5] Verification of Security Protocols [J]. VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, 2009, 5403 : 5 - 13
- [6] Lazy Self-composition for Security Verification [J]. COMPUTER AIDED VERIFICATION, CAV 2018, PT II, 2018, 10982 : 136 - 156
- [7] Verification of randomized security protocols [J]. 2017 32ND ANNUAL ACM/IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE (LICS), 2017,
- [8] Generic verification of security protocols [J]. MODEL CHECKING SOFTWARE, PROCEEDINGS, 2005, 3639 : 221 - 235
- [10] Automated Verification of Accountability in Security Protocols [J]. 2019 IEEE 32ND COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2019), 2019, : 397 - 413