共 50 条
- [21] On Backward-Style Verification for Timed Anonymity of Security Protocols 2016 IEEE 5TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS, 2016,
- [22] Using Backward Induction Techniques in (Timed) Security Protocols Verification COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 265 - 276
- [23] Formal verification: an imperative step in the design of security protocols COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2003, 43 (05): : 601 - 618
- [25] Formal verification of type flaw attacks in security protocols ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2003, : 415 - 424
- [26] Security in Wireless Sensor Networks: A formal verification of protocols 2019 IEEE 17TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2019, : 425 - 431
- [27] Formal Verification of Security Protocols: the Squirrel Prover (Keynote) FOUNDATIONS AND PRACTICE OF SECURITY, PT II, FPS 2023, 2024, 14552 : XI - XIV
- [28] Formal Verification of Security Protocols: the Squirrel Prover (Keynote) FOUNDATIONS AND PRACTICE OF SECURITY, PT I, FPS 2023, 2024, 14551 : XI - XIV
- [30] Formal specification and verification method of concurrent and distributed systems by restricted timed automata TRANSFORMATION-BASED REACTIVE SYSTEMS DEVELOPMENT, 1997, 1231 : 169 - 183