共 50 条
- [21] Security Analysis of the Kerberos protocol using BAN logic FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 467 - +
- [22] Key exchange protocol for Wireless Sensor Network: Formal verification using CSN modal logic 2008 IEEE SENSORS APPLICATIONS SYMPOSIUM, 2008, : 193 - 198
- [23] Formal Verification of RGR-SEC, a Secured RGR Routing for UAANETs Using AVISPA, Scyther and Tamarin FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2018, 2018, 878 : 3 - 16
- [24] Formal Verification of mCWQ Using Extended Hoare Logic Mobile Networks and Applications, 2019, 24 : 134 - 144
- [26] Formal Verification of mCWQ Using Extended Hoare Logic MOBILE NETWORKS & APPLICATIONS, 2019, 24 (01): : 134 - 144
- [27] SSMBP: A Secure SMS-based Mobile Banking Protocol with Formal Verification 2015 IEEE 11TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2015, : 252 - 259
- [28] Analysis of LEACH Protocol(s) using Formal Verification 2015 12TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2015, : 254 - 262
- [29] Formal Verification of the Pastry Protocol Using TLA+ DEPENDABLE SOFTWARE ENGINEERING: THEORIES, TOOLS, AND APPLICATIONS, SETTA 2015, 2015, 9409 : 284 - 299
- [30] Formal verification of communication protocol using type theory 2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 1585 - 1593