共 50 条
- [31] Verification of Security Protocols with Lists: From Length One to Unbounded Length PRINCIPLES OF SECURITY AND TRUST, POST 2012, 2012, 7215 : 69 - 88
- [32] Multi-input Functional Encryption with Unbounded-Message Security ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 : 531 - 556
- [33] Abstraction by Set-Membership Verifying Security Protocols and Web Services with Databases PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 351 - 360
- [34] SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 253 - 270
- [35] Verifying mobile ad-hoc security routing protocols with type inference Ruan Jian Xue Bao/Journal of Software, 2009, 20 (10): : 2822 - 2833
- [38] Verifying Accountability for Unbounded Sets of Participants 2021 IEEE 34TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2021), 2021, : 173 - 188
- [39] Message packing as a performance enhancement strategy with application to the totem protocols IEEE GLOBECOM 1996 - CONFERENCE RECORD, VOLS 1-3: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 649 - 653
- [40] Verifying norm compliancy of protocols COORDINATION, ORGANIZATIONS, INSTITUTIONS, AND NORMS IN MULTI-AGENT SYSTEMS, 2006, 3913 : 231 - 245