共 50 条
- [1] Security protocols and specifications [J]. FOUNDATIONS OF SOFTWARE SCIENCE AND COMPUTATION STRUCTURES, 1999, 1578 : 1 - 13
- [2] Intensional specifications of security protocols [J]. 9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 28 - 38
- [4] Verifying layered security protocols [J]. JOURNAL OF COMPUTER SECURITY, 2015, 23 (03) : 259 - 307
- [5] Overview security analysis of 3G authentication protocols and technical specifications [J]. Qinghua Daxue Xuebao/Journal of Tsinghua University, 2009, 49 (SUPPL. 2): : 2193 - 2199
- [6] Modeling and analysis of security protocols using role based specifications and Petri nets [J]. APPLICATIONS AND THEORY OF PETRI NETS, 2008, 5062 : 72 - +
- [7] MoSS: Modular Security Specifications Framework [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT III, 2021, 12827 : 33 - 63
- [8] ProToc-An Universal Language for Security Protocols Specifications [J]. SOFT COMPUTING IN COMPUTER AND INFORMATION SCIENCE, 2015, 342 : 237 - 248
- [10] Modeling and Analysis of Agent-Based Specifications of Security Protocols Using CSANs and PDETool [J]. 2009 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2009, : 151 - 155