共 50 条
- [1] Model checking analysis of needham-schroeder public-key protocol Ruan Jian Xue Bao/Journal of Software, 2000, 11 (10): : 1348 - 1352
- [2] Breaking and fixing the Needham-Schroeder public-key protocol using FDR SOFTWARE-CONCEPTS AND TOOLS, 1996, 17 (03): : 93 - 102
- [3] Analyzing the Needham-Schroeder public-key protocol: A comparison of two approaches Lecture Notes in Computer Science, 1996, 1146
- [4] Improvement and security analysis on symmetric key authentication protocol Needham-Schroeder APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 1289 - 1293
- [5] A parameterized analysis of public-key protocols:Needham-Schroeder and Kerberos-5 ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 294 - +
- [6] Using backward strategy to the Needham-Schroeder public key protocol verification ARTIFICIAL INTELLIGENCE AND SECURITY IN COMPUTING SYSTEMS, 2003, 752 : 249 - 259
- [7] Formal analysis of Needham-Schroeder protocol Ruan Jian Xue Bao/Journal of Software, 2002, 13 (SUPPL.): : 86 - 92
- [8] Proving Authentication Property of Modified Needham-Schroeder Protocol with Logic of Events PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL APPLICATIONS (CISIA 2015), 2015, 18 : 379 - 383