共 50 条
- [1] Performance analysis of cryptographic protocols on handheld devices THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2004, : 169 - 174
- [3] Algebra model and security analysis for cryptographic protocols SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (02): : 199 - 220
- [4] Algebra model and security analysis for cryptographic protocols Science in China Series F: Information Sciences, 2004, 47 : 199 - 220
- [5] Collusion analysis of cryptographic protocols IEEE GLOBECOM 1996 - CONFERENCE RECORD, VOLS 1-3: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 1 - 5
- [6] Using SPIN to model cryptographic protocols ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 741 - 745
- [7] The Model Reasoning Verifier for cryptographic protocols COMPUTER SCIENCE AND TECHNOLOGY IN NEW CENTURY, 2001, : 290 - 295
- [8] A Logic to Model Time in Cryptographic Protocols ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 399 - 403
- [9] Symbolic trace analysis of cryptographic protocols AUTOMATA LANGUAGES AND PROGRAMMING, PROCEEDING, 2001, 2076 : 667 - 681
- [10] Cryptographic Protocols Analysis in Event B PERSPECTIVES OF SYSTEMS INFORMATICS, 2010, 5947 : 282 - +