共 50 条
- [11] Non interference for the analysis of cryptographic protocols AUTOMATA LANGUAGES AND PROGRAMMING, 2000, 1853 : 354 - 372
- [13] CVS: a compiler for the analysis of cryptographic protocols PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, : 203 - 212
- [14] New analysis method of cryptographic protocols Jisuanji Gongcheng/Computer Engineering, 2001, 27 (03):
- [16] Model-based testing of cryptographic protocols TRUSTWORTHY GLOBAL COMPUTING, 2005, 3705 : 33 - 60
- [17] Honest functions and their application to the analysis of cryptographic protocols Proceedings of the Computer Security Foundations Workshop, 1999, : 83 - 89
- [18] Key substitution in the symbolic analysis of cryptographic protocols FSTTCS 2007: FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE, PROCEEDINGS, 2007, 4855 : 121 - 132
- [20] Cryptographic Protocols' Performance and Network Layer Security of RSMAD 2011 34TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2011, : 9 - 13