共 50 条
- [21] Unwinding conditions for security in imperative languages [J]. LOGIC BASED PROGRAM SYNTHESIS AND TRANSFORMATION, 2005, 3573 : 85 - 100
- [22] Compiling and verifying security protocols [J]. LOGIC FOR PROGRAMMING AND AUTOMATED REASONING, PROCEEDINGS, 2000, 1955 : 131 - 160
- [25] Verifying layered security protocols [J]. JOURNAL OF COMPUTER SECURITY, 2015, 23 (03) : 259 - 307
- [26] Verifying the independence of security protocols [J]. ICCP 2007: IEEE 3RD INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2007, : 155 - +
- [27] Possibilistic definitions of security - An assembly kit [J]. 13TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2000, : 185 - 199
- [28] Verifying the consistency of security policies by abstracting into security types [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, 2007, : 497 - +
- [29] Probabilistic bisimulation and equivalence for security analysis of network protocols [J]. FOUNDATIONS OF SOFTWARE SCIENCE AND COMPUTATION STRUCTURES, PROCEEDINGS, 2004, 2987 : 468 - 483
- [30] Verifying security protocols by knowledge analysis [J]. Int. J. Secur. Netw., 2008, 3 (183-192): : 183 - 192