共 50 条
- [11] The Simplified Inductive Approach to Verifying Security Protocols PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 523 - 526
- [12] A Z based approach to verifying security protocols FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2003, 2885 : 375 - 395
- [13] Verifying second-level security protocols THEOREM PROVING IN HIGHER ORDER LOGICS, PROCEEDINGS, 2003, 2758 : 352 - 366
- [16] An intruder model for verifying liveness in security protocols Proc. Fourth ACM Workshop Formal Methods Secur. Eng. FMSE Conf.Comput. Commun. Secur., 2006, (23-32):
- [17] Knowledge Based Approach for Mechanically Verifying Security Protocols 19TH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI-05), 2005, : 1572 - 1573
- [19] Modeling and Verifying Security Protocols Using UML 2 2011 IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON 2011), 2011, : 72 - 79