共 50 条
- [1] Proving properties of security protocols by induction 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 70 - 83
- [2] Proving security protocols correct Proceedings - Symposium on Logic in Computer Science, 1999, : 370 - 381
- [3] Exploiting Symmetries When Proving Equivalence Properties for Security Protocols PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 905 - 922
- [5] LoET-E: A Refined Theory for Proving Security Properties of Cryptographic Protocols IEEE ACCESS, 2019, 7 : 59871 - 59883
- [6] A Logic for Signature based Security Protocols ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, : 99 - 105
- [8] Formalizing and Proving a Typing Result for Security Protocols in Isabelle/HOL 2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 451 - 463
- [9] Proving security protocols with model checkers by data independence techniques 11TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP - PROCEEDINGS, 1998, : 84 - 95
- [10] A framework for proving the security of data transmission protocols in sensor network INTELLIGENCE AND SECURITY INFORMATICS, 2007, 4430 : 288 - +