共 50 条
- [2] Verifying authentication protocols with CSP [J]. 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 3 - 17
- [3] Compiling and verifying security protocols [J]. LOGIC FOR PROGRAMMING AND AUTOMATED REASONING, PROCEEDINGS, 2000, 1955 : 131 - 160
- [5] Verifying layered security protocols [J]. JOURNAL OF COMPUTER SECURITY, 2015, 23 (03) : 259 - 307
- [6] Verifying the independence of security protocols [J]. ICCP 2007: IEEE 3RD INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2007, : 155 - +
- [7] Verifying security protocols by knowledge analysis [J]. Int. J. Secur. Netw, 2008, 3 (183-192): : 183 - 192
- [8] Verifying Parameterized Timed Security Protocols [J]. FM 2015: FORMAL METHODS, 2015, 9109 : 342 - 359
- [9] TAuth: Verifying Timed Security Protocols [J]. FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2014, 2014, 8829 : 300 - 315
- [10] Verifying Implementations of Security Protocols by Refinement [J]. VERIFIED SOFTWARE: THEORIES, TOOLS, EXPERIMENTS, 2012, 7152 : 50 - +