共 50 条
- [22] Deciding knowledge in security protocols under equational theories [J]. AUTOMATA , LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2004, 3142 : 46 - 58
- [23] Deciding knowledge in security protocols for monoidal equational theories [J]. LOGIC FOR PROGRAMMING, ARTIFICIAL INTELLIGENCE, AND REASONING, PROCEEDINGS, 2007, 4790 : 196 - +
- [24] A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols [J]. 2016 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2016, : 2098 - 2105
- [25] Cryptographic Protocols' Performance and Network Layer Security of RSMAD [J]. 2011 34TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2011, : 9 - 13
- [26] Using SPIN to verify security properties of cryptographic protocols [J]. MODEL CHECKING SOFTWARE, PROCEEDINGS, 2002, 2318 : 187 - 204
- [28] Universally composable security: A new paradigm for cryptographic protocols [J]. 42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, : 136 - 145
- [29] Cryptographic Protocols Implementation Security Verification Of The Electronic Voting System Based On Blind Intermediaries [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN'19), 2019,
- [30] DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice [J]. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, : 529 - 546