共 50 条
- [24] Security protocol for active networks [J]. ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 58 - +
- [25] Implementing Security Protocol Monitors [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2021, (342): : 22 - 34
- [27] On the Provable Security of the Dragonfly Protocol [J]. INFORMATION SECURITY, ISC 2015, 2015, 9290 : 244 - 261
- [28] Quantifying the Security of a QKD Protocol [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNCATIONS SYSTEMS (ANTS), 2015,
- [29] Security Goals and Protocol Transformations [J]. THEORY OF SECURITY AND APPLICATIONS, 2012, 6993 : 130 - 147
- [30] A study on unknown protocol security [J]. 2020 34TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2020), 2020, : 660 - 662