共 50 条
- [3] A generic model for symbolic analyzing security protocols [J]. Fifth International Conference on Computer and Information Technology - Proceedings, 2005, : 680 - 684
- [6] Timing attacks in security protocols: Symbolic framework and proof techniques [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, 9036 : 280 - 299
- [7] Automatic Verification of Security Protocols in the Symbolic Model: The Verifier Proverif [J]. Blanchet, Bruno (Bruno.Blanchet@inria.fr), 1600, Springer Verlag (8604):
- [8] Symbolic trace analysis of cryptographic protocols [J]. AUTOMATA LANGUAGES AND PROGRAMMING, PROCEEDING, 2001, 2076 : 667 - 681
- [9] Evolutionary approach in the security protocols design [J]. EC2ND 2005, PROCEEDINGS, 2006, : 147 - 156
- [10] Modular approach to the design and analysis of password-based security protocols [J]. Science in China Series F: Information Sciences, 2007, 50 : 381 - 398