共 50 条
- [32] Automated Composition of Security Protocols 2009 IEEE 5TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2009, : 251 - +
- [33] Resiliency of Smart Power Meters to Common Security Attacks 6TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2015), THE 5TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2015), 2015, 52 : 137 - 144
- [34] Network Security and Networking Protocols RECENT TRENDS IN NETWORKS AND COMMUNICATIONS, 2010, 90 : 90 - 97
- [35] Group Anonymity in Security Protocols PROCEEDINGS OF THE 2018 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2018, : 407 - 416
- [37] Operational semantics of security protocols SCENARIOS: MODELS, TRANSFORMATIONS AND TOOLS, 2005, 3466 : 66 - 89
- [38] A decidable analysis of security protocols EXPLORING NEW FRONTIERS OF THEORETICAL INFORMATICS, 2004, 155 : 21 - 21
- [39] Proving security protocols correct Proceedings - Symposium on Logic in Computer Science, 1999, : 370 - 381
- [40] Timed Analysis of Security Protocols INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY - ISAT 2016 - PT II, 2017, 522 : 53 - 63