共 50 条
- [42] Information Assurance for security protocols [J]. COMPUTERS & SECURITY, 2005, 24 (04) : 322 - 333
- [43] Safely composing security protocols [J]. FSTTCS 2007: FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE, PROCEEDINGS, 2007, 4855 : 352 - 363
- [44] Timed analysis of security protocols [J]. JOURNAL OF COMPUTER SECURITY, 2007, 15 (06) : 619 - 645
- [45] Automated Composition of Security Protocols [J]. 2009 IEEE 5TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2009, : 251 - +
- [46] Compiling and verifying security protocols [J]. LOGIC FOR PROGRAMMING AND AUTOMATED REASONING, PROCEEDINGS, 2000, 1955 : 131 - 160
- [47] What is Correctness of Security Protocols? [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2008, 14 (12) : 2083 - 2106
- [48] Network Security and Networking Protocols [J]. RECENT TRENDS IN NETWORKS AND COMMUNICATIONS, 2010, 90 : 90 - 97