共 50 条
- [21] Layered Symbolic Security Analysis in DY [J]. COMPUTER SECURITY - ESORICS 2023, PT III, 2024, 14346 : 3 - 21
- [22] Universally Composable Symbolic Security Analysis [J]. Journal of Cryptology, 2011, 24 : 83 - 147
- [23] A Z based approach to verifying security protocols [J]. FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2003, 2885 : 375 - 395
- [24] The Simplified Inductive Approach to Verifying Security Protocols [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 523 - 526
- [25] Symbolic Analysis of Cryptographic Protocols Containing Bilinear Pairings [J]. 2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 63 - 77
- [26] Web security: Authentication protocols and their analysis [J]. NEW GENERATION COMPUTING, 2001, 19 (03) : 283 - 299
- [27] Formal method for the analysis of security protocols [J]. ICIC Express Letters, 2011, 5 (10): : 3785 - 3789
- [28] Theoretical Analysis of RFID Security Protocols [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2014, : 302 - 306