共 50 条
- [1] Security protocols and specifications [J]. FOUNDATIONS OF SOFTWARE SCIENCE AND COMPUTATION STRUCTURES, 1999, 1578 : 1 - 13
- [2] Intensional specifications of security protocols [J]. 9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 28 - 38
- [4] Operational semantics of security protocols [J]. SCENARIOS: MODELS, TRANSFORMATIONS AND TOOLS, 2005, 3466 : 66 - 89
- [7] Game semantics model for security protocols [J]. FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2005, 3785 : 125 - 140
- [8] Semantics and logic Efor security protocols [J]. JOURNAL OF COMPUTER SECURITY, 2009, 17 (06) : 909 - 944
- [9] Optoelectronic applications: Quantum cryptography - Alice and Bob beef up security [J]. LASER FOCUS WORLD, 2006, 42 (05): : 109 - +
- [10] The unconditional security of quantum key distribution - Alice, Bob, and Eve in quantumland [J]. QUANTUM COMMUNICATION, COMPUTING, AND MEASUREMENT 3, 2001, : 277 - 284