共 50 条
- [1] Provable security for cryptographic protocols - Exact analysis and engineering applications 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 45 - 58
- [2] Automatic verification of cryptographic protocols through compositional analysis techniques TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, 1999, 1579 : 148 - 162
- [3] Experimental comparison of automatic tools for the formal analysis of cryptographic protocols DEPCOS - RELCOMEX '07: INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, PROCEEDINGS, 2007, : 153 - +
- [4] Automatic approximation for the verification of cryptographic protocols FORMAL ASPECTS OF SECURITY, 2003, 2629 : 33 - 48
- [5] Automatic verification of cryptographic protocols with SETHEO AUTOMATED DEDUCTION - CADE-14, 1997, 1249 : 87 - 100
- [7] Automatic verification of time sensitive cryptographic protocols TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PROCEEDINGS, 2004, 2988 : 342 - 356
- [8] Formal automatic verification of authentication cryptographic protocols FIRST IEEE INTERNATIONAL CONFERENCE ON FORMAL ENGINEERING METHODS, PROCEEDINGS, 1997, : 50 - 59
- [9] Protocol engineering principles for cryptographic protocols design SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 641 - +
- [10] Collusion analysis of cryptographic protocols IEEE GLOBECOM 1996 - CONFERENCE RECORD, VOLS 1-3: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 1 - 5