共 50 条
- [21] A Performance Analysis Model for Cryptographic Protocols [J]. ICSIT 2011: THE 2ND INTERNATIONAL CONFERENCE ON SOCIETY AND INFORMATION TECHNOLOGIES, 2011, : 80 - 85
- [22] A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols [J]. 2016 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2016, : 2098 - 2105
- [23] Using SPIN to verify security properties of cryptographic protocols [J]. MODEL CHECKING SOFTWARE, PROCEEDINGS, 2002, 2318 : 187 - 204
- [25] Universally composable security: A new paradigm for cryptographic protocols [J]. 42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, : 136 - 145
- [26] Performance analysis of cryptographic protocols on handheld devices [J]. THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2004, : 169 - 174
- [27] Provable security for cryptographic protocols - Exact analysis and engineering applications [J]. 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 45 - 58
- [28] Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree Framework [J]. APPLIED SCIENCES-BASEL, 2023, 13 (23):