共 50 条
- [1] Symbolic trace analysis of cryptographic protocols AUTOMATA LANGUAGES AND PROGRAMMING, PROCEEDING, 2001, 2076 : 667 - 681
- [2] Symbolic Analysis of Cryptographic Protocols Containing Bilinear Pairings 2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 63 - 77
- [3] A Symbolic Logic with Exact Bounds for Cryptographic Protocols LOGIC, LANGUAGE, INFORMATION AND COMPUTATION, WOLLIC 2011, 2011, 6642 : 3 - 3
- [4] Computing symbolic models for verifying cryptographic protocols 14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, : 160 - 173
- [6] ASAP: Algorithm Substitution Attacks on Cryptographic Protocols ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 712 - 726
- [7] A symbolic decision procedure for cryptographic protocols with time stamps CONCUR 2004 - CONCURRENCY THEORY, PROCEEDINGS, 2004, 3170 : 177 - 192
- [8] A symbolic decision procedure for cryptographic protocols with time stamps JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2005, 65 (01): : 1 - 35
- [9] Suitable Symbolic Models for Cryptographic Verification of Secure Protocols in ProVerif PROCEEDINGS OF 2018 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2018), 2018, : 326 - 330
- [10] Collusion analysis of cryptographic protocols IEEE GLOBECOM 1996 - CONFERENCE RECORD, VOLS 1-3: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 1 - 5