共 50 条
- [31] Bioinspired Security Analysis of Wireless Protocols [J]. MOBILE NETWORKS & APPLICATIONS, 2016, 21 (01): : 139 - 148
- [32] Security issues in control, management and routing protocols [J]. COMPUTER NETWORKS, 2000, 34 (06) : 881 - 894
- [33] A method for symbolic analysis of security protocols [J]. THEORETICAL COMPUTER SCIENCE, 2005, 338 (1-3) : 393 - 425
- [34] A Critical Analysis of RFID Security Protocols [J]. 2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1357 - 1362
- [35] A type and effect analysis of security protocols [J]. STATIC ANALYSIS, PROCEEDINGS, 2001, 2126 : 432 - 432
- [36] Casper: A compiler for the analysis of security protocols [J]. 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 18 - 30
- [37] Formal analysis of modern security protocols [J]. INFORMATION SCIENCES, 2005, 171 (1-3) : 189 - 211
- [38] A Hybrid Analysis for Security Protocols with State [J]. INTEGRATED FORMAL METHODS, IFM 2014, 2014, 8739 : 272 - 287
- [39] Bioinspired Security Analysis of Wireless Protocols [J]. Mobile Networks and Applications, 2016, 21 : 139 - 148
- [40] Analysis of security protocols as open systems [J]. THEORETICAL COMPUTER SCIENCE, 2003, 290 (01) : 1057 - 1106