共 50 条
- [41] A security analysis of the OAuth protocol 2013 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM), 2013, : 271 - 276
- [42] Security Analysis of SKI Protocol 2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 199 - 203
- [43] Analysis of a security protocol in μCRL FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2002, 2495 : 396 - 400
- [44] Fluid Computing - Interest-based Communication in Dataflow/Multiset Rewriting Computing PROCEEDINGS OF THE 10TH EURO-AMERICAN CONFERENCE ON TELEMATICS AND INFORMATION SYSTEMS (EATIS 2020), 2020,
- [46] Conditional Observational Equivalence and Off-line Guessing Attacks in Multiset Rewriting 2022 IEEE 35TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2022), 2022, : 1 - 16
- [47] Relating Nominal and Higher-Order Rewriting MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 2014, PT I, 2014, 8634 : 244 - 255
- [48] Rewriting the book on homeland security AVIATION WEEK & SPACE TECHNOLOGY, 2002, 156 (02): : 436 - 436
- [49] Rewriting for cryptographic protocol verification AUTOMATED DEDUCTION - CADE-17, 2000, 1831 : 271 - 290