共 50 条
- [1] A Security Protocol Applied to Covert Communication Platform and Its Formal Analysis [J]. IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 307 - 311
- [2] Formal Security Analysis of the MaCAN Protocol [J]. INTEGRATED FORMAL METHODS, IFM 2014, 2014, 8739 : 241 - 255
- [3] A Formal Security Analysis of the Signal Messaging Protocol [J]. 2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, : 451 - 466
- [4] A Formal Security Analysis of the Signal Messaging Protocol [J]. JOURNAL OF CRYPTOLOGY, 2020, 33 (04) : 1914 - 1983
- [5] A Formal Security Analysis of the Signal Messaging Protocol [J]. Journal of Cryptology, 2020, 33 : 1914 - 1983
- [6] An Authentication Protocol Applied to RFID Security Systems [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 307 - +
- [7] On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis [J]. 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, : 498 - 505
- [8] Formal modeling and security analysis method of security protocol based on CPN [J]. Tongxin Xuebao/Journal on Communications, 2021, 42 (09): : 240 - 253
- [10] An Improved Security Protocol Formal Analysis with BAN Logic [J]. ECBI: 2009 INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE AND BUSINESS INTELLIGENCE, PROCEEDINGS, 2009, : 102 - +