共 50 条
- [31] Protocols for Checking Compromised Credentials PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 1387 - 1403
- [32] PVS: Combining specification, proof checking, and model checking FORMAL METHODS IN COMPUTER-AIDED DESIGN, 1996, 1166 : 257 - 264
- [33] Model checking contractual protocols LEGAL KNOWLEDGE AND INFORMATION SYSTEMS, 2000, 64 : 35 - 47
- [34] Model checking of authentication protocols Jisuanji Xuebao/Chinese Journal of Computers, 2003, 26 (02): : 195 - 201
- [35] Model checking guarded protocols 18TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2003, : 361 - 370
- [40] Towards lean proof checking DESIGN AND IMPLEMENTATION OF SYMBOLIC COMPUTATION SYSTEMS, 1996, 1128 : 61 - 62