共 50 条
- [1] Formal Analysis for Security of Otway-Rees Protocol with BAN Logic [J]. FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 590 - +
- [2] Security Analysis of the Kerberos protocol using BAN logic [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 467 - +
- [3] Where you are Based Authentication: An Improved Security Protocol Using BAN Logic [J]. PROCEEDINGS OF THE 7TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2008, : 153 - 162
- [4] An Improved NSSK Protocol and Its Security Analysis based on Logic Approach [J]. 2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 864 - 867
- [5] Formal Verification of Secure Evidence Collection Protocol using BAN Logic and AVISPA [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 : 1334 - 1344
- [6] Formal Security Analysis of the MaCAN Protocol [J]. INTEGRATED FORMAL METHODS, IFM 2014, 2014, 8739 : 241 - 255
- [7] The study on the application of BAN logic in formal analysis of authentication protocols [J]. Seventh International Conference on Electronic Commerce, Vols 1 and 2, Selected Proceedings, 2005, : 744 - 747
- [8] Security Analysis of OIAP Implementation Based on BAN Logic [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 144 - +
- [9] A Formal Security Analysis of the Signal Messaging Protocol [J]. 2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, : 451 - 466
- [10] A Formal Security Analysis of the Signal Messaging Protocol [J]. JOURNAL OF CRYPTOLOGY, 2020, 33 (04) : 1914 - 1983