共 50 条
- [1] A Method for Patching Interleaving-Replay Attacks in Faulty Security Protocols [J]. Electron. Notes Theor. Comput. Sci., 2007, 4 (117-130):
- [3] Design of Authentication Protocols Preventing Replay Attacks [J]. 2009 INTERNATIONAL CONFERENCE ON FUTURE BIOMEDICAL INFORMATION ENGINEERING (FBIE 2009), 2009, : 362 - 365
- [4] Algebraic Replay Attacks on Authentication in RFID Protocols [J]. ADVANCES IN SECURITY OF INFORMATION AND COMMUNICATION NETWORKS, 2013, 381 : 153 - +
- [5] A formal analysis for capturing replay attacks in cryptographic protocols [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 150 - +
- [6] Formally analysing a security protocol for replay attacks [J]. 2006 AUSTRALIAN SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2006, : 171 - +
- [7] Uncovering attacks on security protocols [J]. Third International Conference on Information Technology and Applications, Vol 2, Proceedings, 2005, : 572 - 575
- [8] On the automated correction of security protocols susceptible to a replay attack [J]. COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 594 - +
- [9] Detecting collusion attacks in security protocols [J]. FRONTIERS OF WWW RESEARCH AND DEVELOPMENT - APWEB 2006, PROCEEDINGS, 2006, 3841 : 297 - 306
- [10] Desynchronization attacks on RFID security protocols [J]. Deng, M. (dmlei2003@163.com), 1600, Universitas Ahmad Dahlan (11):