共 50 条
- [1] Security protocols and specifications [J]. FOUNDATIONS OF SOFTWARE SCIENCE AND COMPUTATION STRUCTURES, 1999, 1578 : 1 - 13
- [2] Intensional specifications of security protocols [J]. 9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 28 - 38
- [3] The layered games framework for specifications and analysis of security protocols [J]. THEORY OF CRYPTOGRAPHY, 2008, 4948 : 125 - 141
- [5] On Universal Composable Security of Time-Stamping Protocols [J]. APPLIED PUBLIC KEY INFRASTRUCTURE, 2005, 128 : 169 - 181
- [7] Provably correct Java implementations of Spi Calculus security protocols specifications [J]. Comput Secur, 3 (302-314):
- [8] Overview security analysis of 3G authentication protocols and technical specifications [J]. Qinghua Daxue Xuebao/Journal of Tsinghua University, 2009, 49 (SUPPL. 2): : 2193 - 2199
- [10] Experience report: How to extract security protocols' specifications from C libraries [J]. 2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2018), VOL 2, 2018, : 719 - 724