共 50 条
- [2] Symbolic trace analysis of cryptographic protocols [J]. AUTOMATA LANGUAGES AND PROGRAMMING, PROCEEDING, 2001, 2076 : 667 - 681
- [3] Formal Analysis for Cryptographic Protocols on a Trace Semantics [J]. INTERNATIONAL CONFERENCE ON FUTURE NETWORKS, PROCEEDINGS, 2009, : 127 - 129
- [4] On-the-fly resolve trace minimization [J]. 2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2007, : 594 - +
- [5] Retailoring for Fast, On-the-Fly Trace Generation for NoC Design Space Exploitation [J]. 2014 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C 2014), 2014, : 1030 - 1033
- [6] ON-THE-FLY AUTOMATIC GENERATION OF SECURITY PROTOCOLS [J]. ICEIS 2008: PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL ISAS-2: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, VOL 2, 2008, : 97 - 104
- [8] On-the-Fly Trace Generation Approach to the Security Analysis of the TMN Protocol with Homomorphic Property: A Petri Nets-Based Method [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (01): : 215 - 229
- [10] Provable security for cryptographic protocols - Exact analysis and engineering applications [J]. 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 45 - 58