共 50 条
- [1] Formal Verification of IEEE 802.16 Security Sublayer Using Scyther Tool [J]. 2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, 2009, : 172 - +
- [3] Formal Verification of Security Protocols Using Spin [J]. 2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2016, : 637 - 642
- [4] Formal specification and security verification of the IDKE protocol using FDR model checking [J]. 2005 13TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS JOINTLY HELD WITH THE 2005 7TH IEEE MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS 1 AND 2, 2005, : 329 - 334
- [6] Verification of a formal security model for multiapplicative smart cards [J]. COMPUTER SECURITY - ESORICS 2000, PROCEEDINGS, 2000, 1895 : 17 - 36
- [7] Formal verification of ASM designs using the MDG tool [J]. FIRST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND FORMAL METHODS, PROCEEDINGS, 2003, : 210 - 219
- [8] FORVEST: A Support Tool for Formal Verification of Security Specifications with ISO/IEC 15408 [J]. 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 624 - +
- [9] Formal specification and verification of resource bound security using PVS [J]. SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2004, 3233 : 113 - 133
- [10] Using temporal logics of knowledge in the formal verification of security protocols [J]. 11TH INTERNATIONAL SYMPOSIUM ON TEMPORAL REPRESENTATION AND REASONING, PROCEEDINGS, 2004, : 148 - 151