共 50 条
- [1] Formal analysis and design principles of cryptographic protocols [J]. Nanjing Youdian Xueyuan Xuebao/Journal of Nanjing Institute of Posts and Telecommunications, 2001, 21 (03):
- [3] Design and analysis of cryptographic protocols for RFID [J]. Jisuanji Xuebao, 2006, 4 (581-589):
- [4] Some applications of polynomials for the design of cryptographic protocols [J]. SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 1 - 13
- [5] Simulation in cryptographic protocol design and analysis [J]. SIMULATION IN INDUSTRY, 2003, : 475 - 480
- [6] Provable security for cryptographic protocols - Exact analysis and engineering applications [J]. 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 45 - 58
- [7] Domain Engineering for Automatic Analysis of Financial Applications of Cryptographic Protocols [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2010, 6052 : 428 - 428
- [8] Design of cryptographic protocols by means of genetic algorithms techniques [J]. SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 316 - +
- [9] Cryptographic protocol design concept with genetic algorithms [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2005, 3682 : 483 - 489
- [10] Stateless Cryptographic Protocols [J]. 2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, : 678 - 687