共 50 条
- [2] An Integrated Model to Analyze Cryptographic Protocols with Colored Petri Nets 11TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2008, : 457 - 460
- [3] Analysis of Concurrent Security Protocols Using Colored Petri Nets 2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 1, PROCEEDINGS, 2009, : 227 - 230
- [4] Analysis of two authorization protocols using Colored Petri Nets International Journal of Information Security, 2015, 14 : 221 - 247
- [7] Modeling and Analysis of Authentication Protocols. Using Colored Petri Nets PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 443 - 448
- [8] Specification of timed authentication protocols with colored Petri nets ADVANCED COMPUTER SYSTEMS, PROCEEDINGS, 2002, 664 : 383 - 392
- [9] Using colored Petri nets to simulate object Petri nets International Conference on Computing, Communications and Control Technologies, Vol 5, Proceedings, 2004, : 27 - 31
- [10] Considering Time in Formal Analysis of Security Protocols Using Colored Petri Nets 2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS SYMPOSIA, PROCEEDINGS, 2008, : 63 - 68