共 50 条
- [41] Cryptographic protocol security analysis based on bounded constructing algorithm Science in China Series F, 2006, 49 : 26 - 47
- [43] Security verification of real-time cryptographic protocols using a rewriting approach IEICE Trans Inf Syst, 4 (355-363):
- [45] Secure Force: A Low-Complexity Cryptographic Algorithm for Wireless Sensor Network (WSN) 2013 IEEE INTERNATIONAL CONFERENCE ON CONTROL SYSTEM, COMPUTING AND ENGINEERING (ICCSCE 2013), 2013, : 557 - 562
- [46] Enhancing the security of El Gamal's signature scheme IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1997, 144 (01): : 47 - 48
- [48] Cryptographic Protocol Security Verification of the Electronic Voting System Based on Blinded Intermediaries PROCEEDINGS OF THE THIRD INTERNATIONAL SCIENTIFIC CONFERENCE INTELLIGENT INFORMATION TECHNOLOGIES FOR INDUSTRY (IITI'18), VOL 2, 2019, 875 : 49 - 57
- [50] Cryptographic protocol security analysis based on bounded constructing algorithm SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2006, 49 (01): : 26 - 47