共 50 条
- [42] Analyzing cryptographic protocols to strengthen HR information security JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (08): : 2495 - 2509
- [43] Cryptographic Protocols' Performance and Network Layer Security of RSMAD 2011 34TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2011, : 9 - 13
- [44] Adversarial Security Analysis of Cryptographic Protocols for IoD Networks IEEE ACCESS, 2024, 12 : 183792 - 183808
- [45] Using SPIN to verify security properties of cryptographic protocols MODEL CHECKING SOFTWARE, PROCEEDINGS, 2002, 2318 : 187 - 204
- [47] Universally composable security: A new paradigm for cryptographic protocols 42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, : 136 - 145
- [48] On the secure implementation of security protocols PROGRAMMING LANGUAGES AND SYSTEMS, 2003, 2618 : 144 - 158
- [50] Panel on languages for formal specification of security protocols 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 96 - 96