共 50 条
- [1] Automatic approximation for the verification of cryptographic protocols [J]. FORMAL ASPECTS OF SECURITY, 2003, 2629 : 33 - 48
- [2] Automatic verification of time sensitive cryptographic protocols [J]. TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PROCEEDINGS, 2004, 2988 : 342 - 356
- [3] Formal automatic verification of authentication cryptographic protocols [J]. FIRST IEEE INTERNATIONAL CONFERENCE ON FORMAL ENGINEERING METHODS, PROCEEDINGS, 1997, : 50 - 59
- [4] Automatic verification of cryptographic protocols through compositional analysis techniques [J]. TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, 1999, 1579 : 148 - 162
- [6] Automatic Verification for Secrecy of Cryptographic Protocols in First-Order Logic [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2009, 5 (01): : 14 - 14
- [7] Automatic verification for secrecy of cryptographic protocols in first-order logic [J]. INTERNATIONAL SYMPOSIUM ON ADVANCES IN COMPUTER AND SENSOR NETWORKS AND SYSTEMS, PROCEEDINGS: IN CELEBRATION OF 60TH BIRTHDAY OF PROF. S. SITHARAMA IYENGAR FOR HIS CONTRIBUTIONS TO THE SCIENCE OF COMPUTING, 2008, : 75 - 80
- [8] Runtime verification of cryptographic protocols [J]. COMPUTERS & SECURITY, 2010, 29 (03) : 315 - 330
- [9] Verifiable Verification in Cryptographic Protocols [J]. PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 3239 - 3253