共 50 条
- [1] An Improved Security Protocol Formal Analysis with BAN Logic [J]. ECBI: 2009 INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE AND BUSINESS INTELLIGENCE, PROCEEDINGS, 2009, : 102 - +
- [2] Formal Analysis for Security of Otway-Rees Protocol with BAN Logic [J]. FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 590 - +
- [3] Where you are Based Authentication: An Improved Security Protocol Using BAN Logic [J]. PROCEEDINGS OF THE 7TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2008, : 153 - 162
- [4] Security analysis of Kerberos protocol based on SPEAR II [J]. Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2015, 37 (10): : 2292 - 2297
- [5] Security Analysis of the Access Control Solution of NDN Using BAN Logic [J]. Mobile Networks and Applications, 2020, 25 : 1162 - 1173
- [6] Security Analysis of the Access Control Solution of NDN Using BAN Logic [J]. MOBILE NETWORKS & APPLICATIONS, 2020, 25 (03): : 1162 - 1173
- [7] Security analysis of Kerberos protocol based on the strand space model [J]. Gaojishu Tongxin, 2008, 9 (909-914): : 909 - 914
- [8] Security Analysis of OIAP Implementation Based on BAN Logic [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 144 - +
- [9] Security analysis and implementation of JUIT-Image Based Authentication system using Kerberos protocol [J]. 7TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE IN CONJUNCTION WITH 2ND IEEE/ACIS INTERNATIONAL WORKSHOP ON E-ACTIVITY, PROCEEDINGS, 2008, : 575 - +
- [10] Training Scenario for Security Testing of the Kerberos Protocol [J]. ADVANCES AND TRENDS IN ARTIFICIAL INTELLIGENCE: THEORY AND APPLICATIONS, IEA-AIE 2024, 2024, 14748 : 56 - 67