共 50 条
- [1] Collusion analysis of cryptographic protocols [J]. IEEE GLOBECOM 1996 - CONFERENCE RECORD, VOLS 1-3: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 1 - 5
- [2] Symbolic trace analysis of cryptographic protocols [J]. AUTOMATA LANGUAGES AND PROGRAMMING, PROCEEDING, 2001, 2076 : 667 - 681
- [3] Non interference for the analysis of cryptographic protocols [J]. AUTOMATA LANGUAGES AND PROGRAMMING, 2000, 1853 : 354 - 372
- [5] A Performance Analysis Model for Cryptographic Protocols [J]. ICSIT 2011: THE 2ND INTERNATIONAL CONFERENCE ON SOCIETY AND INFORMATION TECHNOLOGIES, 2011, : 80 - 85
- [6] New analysis method of cryptographic protocols [J]. Jisuanji Gongcheng/Computer Engineering, 2001, 27 (03):
- [7] CVS: a compiler for the analysis of cryptographic protocols [J]. PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, : 203 - 212
- [8] Design and analysis of cryptographic protocols for RFID [J]. Jisuanji Xuebao, 2006, 4 (581-589):
- [10] Honest functions and their application to the analysis of cryptographic protocols [J]. Proceedings of the Computer Security Foundations Workshop, 1999, : 83 - 89