共 50 条
- [34] A formal analysis for capturing replay attacks in cryptographic protocols ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 150 - +
- [35] Process algebraic frameworks for the specification and analysis of cryptographic protocols MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 2003, PROCEEDINGS, 2003, 2747 : 46 - 67
- [36] Adversarial Security Analysis of Cryptographic Protocols for IoD Networks IEEE ACCESS, 2024, 12 : 183792 - 183808
- [37] Decision procedures for the analysis of cryptographic protocols by logics of belief PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, : 44 - 54
- [38] A survey on computationally sound formal analysis of cryptographic protocols Jisuanji Xuebao/Chinese Journal of Computers, 2014, 37 (05): : 993 - 1016
- [39] Automated analysis of cryptographic protocols using Mur phi 1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, : 141 - 151