共 50 条
- [2] Breaking and fixing the Needham-Schroeder public-key protocol using FDR SOFTWARE-CONCEPTS AND TOOLS, 1996, 17 (03): : 93 - 102
- [3] Analyzing the Needham-Schroeder public-key protocol: A comparison of two approaches Lecture Notes in Computer Science, 1996, 1146
- [4] Model Checking of Needham-Schroeder Protocol Using UPPAAL 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
- [5] A parameterized analysis of public-key protocols:Needham-Schroeder and Kerberos-5 ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 294 - +
- [6] Using backward strategy to the Needham-Schroeder public key protocol verification ARTIFICIAL INTELLIGENCE AND SECURITY IN COMPUTING SYSTEMS, 2003, 752 : 249 - 259
- [7] Formal analysis of Needham-Schroeder protocol Ruan Jian Xue Bao/Journal of Software, 2002, 13 (SUPPL.): : 86 - 92
- [8] Model Checking Needham-Schroeder Security Protocol based on Temporal Logic of Knowledge NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 551 - +
- [9] Improvement and security analysis on symmetric key authentication protocol Needham-Schroeder APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 1289 - 1293