共 50 条
- [32] A bisimulation method for cryptographic protocols PROGRAMMING LANGUAGES AND SYSTEMS, 1998, 1381 : 12 - 26
- [35] Searching for shapes in cryptographic protocols TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PROCEEDINGS, 2007, 4424 : 523 - 537
- [36] On the Difficulty of Using Patient's Physiological Signals in Cryptographic Protocols PROCEEDINGS OF THE 24TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT '19), 2019, : 113 - 122
- [37] Visualization of cryptographic protocols with GRACE JOURNAL OF VISUAL LANGUAGES AND COMPUTING, 2008, 19 (02): : 258 - 290
- [38] Collusion analysis of cryptographic protocols IEEE GLOBECOM 1996 - CONFERENCE RECORD, VOLS 1-3: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 1 - 5