共 50 条
- [41] A Z based approach to verifying security protocols [J]. FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2003, 2885 : 375 - 395
- [42] Verifying second-level security protocols [J]. THEOREM PROVING IN HIGHER ORDER LOGICS, PROCEEDINGS, 2003, 2758 : 352 - 366
- [45] Verifying Security Policies Using Host Attributes [J]. FORMAL TECHNIQUES FOR DISTRIBUTED OBJECTS, COMPONENTS, AND SYSTEMS, 2014, 8461 : 133 - 148
- [46] Verifying Extended Criteria for the Interoperability of Security Devices [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2008, PT II, PROCEEDINGS, 2008, 5332 : 1131 - +
- [47] Enabling food security by verifying agricultural carbon [J]. NATURE CLIMATE CHANGE, 2014, 4 (05) : 309 - 311
- [48] Enabling food security by verifying agricultural carbon [J]. Nature Climate Change, 2014, 4 : 309 - 311
- [50] An intruder model for verifying liveness in security protocols [J]. Proc. Fourth ACM Workshop Formal Methods Secur. Eng. FMSE Conf.Comput. Commun. Secur., 2006, (23-32):