共 50 条
- [1] Automatic detection of attacks on cryptographic protocols: A case study [J]. DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, PROCEEDINGS, 2005, 3548 : 69 - 84
- [3] Security-typed languages for implementation of cryptographic protocols: A case study [J]. COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, 2005, 3679 : 197 - 221
- [5] Superposition Attacks on Cryptographic Protocols [J]. INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 142 - 161
- [6] Synthesising attacks on cryptographic protocols [J]. AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, PROCEEDINGS, 2004, 3299 : 49 - 63
- [8] Algebra model and security analysis for cryptographic protocols [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (02): : 199 - 220
- [9] A formal analysis for capturing replay attacks in cryptographic protocols [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 150 - +
- [10] Algebra model and security analysis for cryptographic protocols [J]. Science in China Series F: Information Sciences, 2004, 47 : 199 - 220