共 50 条
- [1] Compiling and verifying security protocols LOGIC FOR PROGRAMMING AND AUTOMATED REASONING, PROCEEDINGS, 2000, 1955 : 131 - 160
- [4] Verifying the independence of security protocols ICCP 2007: IEEE 3RD INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2007, : 155 - +
- [5] Verifying Security Properties in Unbounded Multiagent Systems AAMAS'16: PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS, 2016, : 1209 - 1217
- [6] Verifying security protocols by knowledge analysis Int. J. Secur. Netw., 2008, 3 (183-192): : 183 - 192
- [7] Verifying Parameterized Timed Security Protocols FM 2015: FORMAL METHODS, 2015, 9109 : 342 - 359
- [8] TAuth: Verifying Timed Security Protocols FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2014, 2014, 8829 : 300 - 315
- [9] Verifying security protocols: An application of CSP COMMUNICATING SEQUENTIAL PROCESSES: THE FIRST 25 YEARS, 2005, 3525 : 243 - 263
- [10] Verifying Implementations of Security Protocols by Refinement VERIFIED SOFTWARE: THEORIES, TOOLS, EXPERIMENTS, 2012, 7152 : 50 - +