共 50 条
- [1] Security analysis of the Cliques protocols suites: First results [J]. TRUSTED INFORMATION: THE NEW DECADE CHALLENGE, 2001, 65 : 151 - 166
- [2] Analysis of Security Protocols and Corresponding Cipher Suites in ETSI M2M Standards [J]. 2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2015, : 777 - 782
- [4] Timed analysis of security protocols [J]. JOURNAL OF COMPUTER SECURITY, 2007, 15 (06) : 619 - 645
- [5] A decidable analysis of security protocols [J]. EXPLORING NEW FRONTIERS OF THEORETICAL INFORMATICS, 2004, 155 : 21 - 21
- [6] Timed Analysis of Security Protocols [J]. INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY - ISAT 2016 - PT II, 2017, 522 : 53 - 63
- [8] Hiding cliques for cryptographic security [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2000, 20 (03) : 269 - 280
- [9] Hiding Cliques for Cryptographic Security [J]. Designs, Codes and Cryptography, 2000, 20 : 269 - 280
- [10] Web security: Authentication protocols and their analysis [J]. NEW GENERATION COMPUTING, 2001, 19 (03) : 283 - 299