共 50 条
- [1] Automated Verification of Accountability in Security Protocols [J]. 2019 IEEE 32ND COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2019), 2019, : 397 - 413
- [2] Challenges in the automated verification of security protocols [J]. AUTOMATED REASONING, PROCEEDINGS, 2008, 5195 : 396 - 409
- [4] Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders [J]. COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 : 450 - 470
- [5] On Backward-Style Verification for Timed Anonymity of Security Protocols [J]. 2016 IEEE 5TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS, 2016,
- [6] Using Backward Induction Techniques in (Timed) Security Protocols Verification [J]. COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 265 - 276
- [7] Automated verification of selected equivalences for security protocols [J]. LICS 2005: 20TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE - PROCEEDINGS, 2005, : 331 - 340
- [8] Automated verification of selected equivalences for security protocols [J]. JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2008, 75 (01): : 3 - 51
- [9] Timed Interpreted Systems as a New Agent-Based Formalism for Verification of Timed Security Protocols [J]. Applied Sciences (Switzerland), 2024, 14 (22):
- [10] Timed Analysis of Security Protocols [J]. INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY - ISAT 2016 - PT II, 2017, 522 : 53 - 63