共 50 条
- [31] A security analysis of the OAuth protocol [J]. 2013 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM), 2013, : 271 - 276
- [32] Sound Security Protocol Transformations [J]. PRINCIPLES OF SECURITY AND TRUST, POST 2013, 2013, 7796 : 83 - 104
- [33] Security and Robustness by Protocol Testing [J]. IEEE SYSTEMS JOURNAL, 2014, 8 (03): : 699 - 707
- [34] Analysis of a security protocol in μCRL [J]. FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2002, 2495 : 396 - 400
- [35] Security in session initiation protocol [J]. ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 1622 - 1626
- [36] Security Analysis of SKI Protocol [J]. 2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 199 - 203
- [37] A Security Service Protocol for MANETs [J]. 2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 1076 - 1077
- [38] Cordial Security Protocol Programming The Obol Protocol Language [J]. SECURITY PROTOCOLS, 2009, 5087 : 62 - +
- [40] Security analysis of the MPOA protocol [J]. IEEE SOUTHEASTCON '99, PROCEEDINGS, 1999, : 102 - 105