共 50 条
- [41] On the formal modeling of inductive verification for cryptographical protocols [J]. 2012 13TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS, AND TECHNOLOGIES (PDCAT 2012), 2012, : 201 - 206
- [42] Formal Verification of Security Protocols Using Spin [J]. 2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2016, : 637 - 642
- [43] Specification and formal verification of interconnect bus protocols [J]. PROCEEDINGS OF THE 43RD IEEE MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS I-III, 2000, : 378 - 382
- [45] Formal design of efficient authentication and key agreement protocols [J]. SECURE INFORMATION NETWORKS: COMMUNICATIONS AND MULTIMEDIA SECURITY, 1999, 23 : 96 - 113
- [48] Fast and Automatic Verification of Authentication and Key Exchange Protocols [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN P2P SYSTEMS (AP2PS 2010), 2010, : 7 - 13
- [49] Fast and Automatic Verification of Authentication and Key Exchange Protocols [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (04): : 1 - 13
- [50] Towards automatic verification of authentication protocols on an unbounded network [J]. 13TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2000, : 132 - 143