共 50 条
- [1] Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther [J]. 2016 24TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING (PDP), 2016, : 553 - 557
- [2] Formal Verification of IEEE 802.16 Security Sublayer Using Scyther Tool [J]. 2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, 2009, : 172 - +
- [3] Formal Verification of Authentication and Confidentiality for TACACS plus Security Protocol using Scyther [J]. 2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
- [4] A Formal Security Analysis of the Signal Messaging Protocol [J]. 2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, : 451 - 466
- [5] A Formal Security Analysis of the Signal Messaging Protocol [J]. JOURNAL OF CRYPTOLOGY, 2020, 33 (04) : 1914 - 1983
- [6] A Formal Security Analysis of the Signal Messaging Protocol [J]. Journal of Cryptology, 2020, 33 : 1914 - 1983
- [7] The Scyther tool: Verification, falsification, and analysis of security protocols [J]. COMPUTER AIDED VERIFICATION, 2008, 5123 : 414 - 418
- [9] Formal analysis of signal protocol based on logic of events theory [J]. SCIENTIFIC REPORTS, 2024, 14 (01):
- [10] Towards more secure EMV purchase transactionsA new security protocol formally analyzed by the Scyther tool [J]. Annals of Telecommunications, 2021, 76 : 203 - 222