共 50 条
- [1] Symbolic trace analysis of cryptographic protocols [J]. AUTOMATA LANGUAGES AND PROGRAMMING, PROCEEDING, 2001, 2076 : 667 - 681
- [2] Non interference for the analysis of cryptographic protocols [J]. AUTOMATA LANGUAGES AND PROGRAMMING, 2000, 1853 : 354 - 372
- [3] Cryptographic Protocols Analysis in Event B [J]. PERSPECTIVES OF SYSTEMS INFORMATICS, 2010, 5947 : 282 - +
- [5] A Performance Analysis Model for Cryptographic Protocols [J]. ICSIT 2011: THE 2ND INTERNATIONAL CONFERENCE ON SOCIETY AND INFORMATION TECHNOLOGIES, 2011, : 80 - 85
- [6] New analysis method of cryptographic protocols [J]. Jisuanji Gongcheng/Computer Engineering, 2001, 27 (03):
- [7] CVS: a compiler for the analysis of cryptographic protocols [J]. PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, : 203 - 212
- [8] Design and analysis of cryptographic protocols for RFID [J]. Jisuanji Xuebao, 2006, 4 (581-589):
- [10] Honest functions and their application to the analysis of cryptographic protocols [J]. Proceedings of the Computer Security Foundations Workshop, 1999, : 83 - 89