共 50 条
- [31] Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project Electron. Notes Theor. Comput. Sci., 1 (123-136):
- [32] Automated verification of wireless security protocols using layered proving trees WSEAS Trans. Commun., 2006, 2 (252-258):
- [34] Automated Verification of Pattern-Based Interaction Invariants in Ajax Applications 2013 28TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2013, : 158 - 168
- [36] Isadora: automated information-flow property generation for hardware security verification Journal of Cryptographic Engineering, 2023, 13 : 391 - 407
- [37] VERICA-Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 255 - 284
- [38] Commutativity in Automated Verification 2023 38TH ANNUAL ACM/IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, LICS, 2023,
- [39] Automated Hypersafety Verification COMPUTER AIDED VERIFICATION, CAV 2019, PT I, 2019, 11561 : 200 - 218