共 32 条
- [21] Limits of the BRSIM/UC soundness of Dolev-Yao models with hashes [J]. COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 404 - 423
- [22] CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions [J]. FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2016, 2016, 10009 : 175 - 192
- [23] Bridging Dolev-Yao Adversaries and Control Systems with Time-Sensitive Channels [J]. CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2013, 2013, 8328 : 167 - 178
- [24] A cryptographically sound Dolev-Yao style security proof of an electronic payment system [J]. 18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2005, : 78 - 93
- [25] A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol [J]. COMPUTER SECURITY ESORICS 2004, PROCEEDINGS, 2004, 3193 : 89 - 108
- [29] Correctness of Self-stabilizing Algorithms under the Dolev Model When Adapted to Composite Atomicity Models [J]. Chen, C.-Y., 1600, Springer Science and Business Media Deutschland GmbH (21):