共 50 条
- [31] Is the verification problem for cryptographic protocols solved? [J]. SECURITY PROTOCOLS, 2005, 3364 : 183 - 189
- [32] A Method of Formal Verification of Cryptographic Circuits [J]. Journal of Electronic Testing, 1998, 13 : 321 - 322
- [33] METHODICAL USE OF CRYPTOGRAPHIC TRANSFORMATIONS IN AUTHENTICATION PROTOCOLS [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1995, 142 (04): : 272 - 278
- [34] Property verification for authentication protocols [J]. ASSET'99: 1999 IEEE SYMPOSIUM ON APPLICATION-SPECIFIC SYSTEMS AND SOFTWARE ENGINEERING & TECHNOLOGY - PROCEEDINGS, 1999, : 82 - 85
- [35] Integrating proof-based and model-checking techniques for the formal verification of cryptographic protocols [J]. COMPUTER AIDED VERIFICATION, 1998, 1427 : 77 - 87
- [36] VERIFICATION AND MODELING OF AUTHENTICATION PROTOCOLS [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1992, 648 : 141 - 154
- [37] Studying Formal Security Proofs for Cryptographic Protocols [J]. INFORMATION SECURITY EDUCATION FOR A GLOBAL DIGITAL SOCIETY, WISE 10, 2017, 503 : 63 - 73
- [38] Formal analysis and design principles of cryptographic protocols [J]. Nanjing Youdian Xueyuan Xuebao/Journal of Nanjing Institute of Posts and Telecommunications, 2001, 21 (03):
- [40] Formal Analysis for Cryptographic Protocols on a Trace Semantics [J]. INTERNATIONAL CONFERENCE ON FUTURE NETWORKS, PROCEEDINGS, 2009, : 127 - 129