共 50 条
- [1] A Formal Analysis Method with Reasoning for Cryptographic Protocols [J]. PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 566 - 570
- [2] Formal Analysis for Cryptographic Protocols on a Trace Semantics [J]. INTERNATIONAL CONFERENCE ON FUTURE NETWORKS, PROCEEDINGS, 2009, : 127 - 129
- [3] Formal testing cryptographic protocols [J]. EDM 2005: International Workshop and Tutorials on Electron Devices and Materials, Proceedings, 2005, : 236 - 237
- [4] A formal analysis for capturing replay attacks in cryptographic protocols [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 150 - +
- [5] A survey on computationally sound formal analysis of cryptographic protocols [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2014, 37 (05): : 993 - 1016
- [6] A problem solving mechanism for formal analysis of cryptographic Protocols [J]. NEW ADVANCES IN SIMULATION, MODELLING AND OPTIMIZATION (SMO '07), 2007, : 95 - 98
- [7] Logic-based formal analysis of cryptographic protocols [J]. ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 300 - +
- [8] A Supporting Tool for Spiral Model of Cryptographic Protocol Design with Reasoning-Based Formal Analysis [J]. ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING: FUTURE INFORMATION TECHNOLOGY, VOL 2, 2016, 354 : 25 - 32
- [10] Experimental comparison of automatic tools for the formal analysis of cryptographic protocols [J]. DEPCOS - RELCOMEX '07: INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, PROCEEDINGS, 2007, : 153 - +