共 50 条
- [31] Formal Support to Security Protocol Development: A Survey [J]. COMPUTACION Y SISTEMAS, 2008, 12 (01): : 89 - 108
- [33] Formal Verification of Authentication and Confidentiality for TACACS plus Security Protocol using Scyther [J]. 2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
- [34] Formal specification and security verification of the IDKE protocol using FDR model checking [J]. 2005 13TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS JOINTLY HELD WITH THE 2005 7TH IEEE MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS 1 AND 2, 2005, : 329 - 334
- [35] Formal Analysis and Optimization of TLS1.3 Protocol in Strong Security Model [J]. Ruan Jian Xue Bao/Journal of Software, 2021, 32 (09): : 2849 - 2866
- [36] Formal Security Analysis of Authentication in SNMPv3 Protocol by An Automated Tool [J]. 2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 1060 - 1064
- [37] Formal Analysis of the Signal Protocol using the Scyther Tool [J]. 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
- [38] Analysis of LEACH Protocol(s) using Formal Verification [J]. 2015 12TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2015, : 254 - 262
- [39] Analysis of the OLSR Protocol by Using Formal Passive Testing [J]. APSEC 09: SIXTEENTH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2009, : 152 - +
- [40] Formal analysis of QUIC handshake protocol using ProVerif [J]. 2020 7TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD 2020)/2020 6TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (EDGECOM 2020), 2020, : 132 - 138