共 50 条
- [41] Generating Models of Infinite-State Communication Protocols Using Regular Inference with Abstraction [J]. TESTING SOFTWARE AND SYSTEMS, 2010, 6435 : 188 - +
- [43] Generating models of infinite-state communication protocols using regular inference with abstraction [J]. Formal Methods in System Design, 2015, 46 : 1 - 41
- [44] SCADA communication and security issues [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (01) : 175 - 194
- [45] Uncovering attacks on security protocols [J]. Third International Conference on Information Technology and Applications, Vol 2, Proceedings, 2005, : 572 - 575
- [46] Validating attacks on authentication protocols [J]. 2007 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2007, : 362 - 369
- [47] A bound on attacks on payment protocols [J]. 16TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2001, : 61 - 70
- [48] Synthesising attacks on cryptographic protocols [J]. AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, PROCEEDINGS, 2004, 3299 : 49 - 63
- [49] Superposition Attacks on Cryptographic Protocols [J]. INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 142 - 161
- [50] A bound on attacks on authentication protocols [J]. FOUNDATIONS OF INFORMATION TECHNOLOGY IN THE ERA OF NETWORK AND MOBILE COMPUTING, 2002, 96 : 588 - 600