共 50 条
- [2] Formal method for the analysis of security protocols [J]. ICIC Express Letters, 2011, 5 (10): : 3785 - 3789
- [4] A generic model for symbolic analyzing security protocols [J]. Fifth International Conference on Computer and Information Technology - Proceedings, 2005, : 680 - 684
- [5] A new formal analysis method for security protocols [J]. Advanced Computer Technology, New Education, Proceedings, 2007, : 724 - 729
- [6] Formal Method for Security Analysis of Electronic Payment Protocols [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2018, E101D (09): : 2291 - 2297
- [8] Timing attacks in security protocols: Symbolic framework and proof techniques [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, 9036 : 280 - 299
- [9] Automatic Verification of Security Protocols in the Symbolic Model: The Verifier Proverif [J]. Blanchet, Bruno (Bruno.Blanchet@inria.fr), 1600, Springer Verlag (8604):
- [10] Symbolic trace analysis of cryptographic protocols [J]. AUTOMATA LANGUAGES AND PROGRAMMING, PROCEEDING, 2001, 2076 : 667 - 681