共 50 条
- [32] Weak bisimulation for Probabilistic timed automata and applications to security [J]. FIRST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND FORMAL METHODS, PROCEEDINGS, 2003, : 34 - 43
- [33] Verifying Parameterized Timed Security Protocols [J]. FM 2015: FORMAL METHODS, 2015, 9109 : 342 - 359
- [34] TAuth: Verifying Timed Security Protocols [J]. FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2014, 2014, 8829 : 300 - 315
- [36] Verifying security protocols: An application of CSP [J]. COMMUNICATING SEQUENTIAL PROCESSES: THE FIRST 25 YEARS, 2005, 3525 : 243 - 263
- [37] Verifying Implementations of Security Protocols by Refinement [J]. VERIFIED SOFTWARE: THEORIES, TOOLS, EXPERIMENTS, 2012, 7152 : 50 - +
- [38] Properties of Possibilistic String Comparison [J]. IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2010, 18 (02) : 312 - 325
- [39] Analyzing security protocols by a bisimulation method based on environmental knowledge [J]. 2005 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS, VOLS 1 AND 2, PROCEEDINGS: VOL 1: COMMUNICATION THEORY AND SYSTEMS, 2005, : 79 - 83
- [40] The Simplified Inductive Approach to Verifying Security Protocols [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 523 - 526