共 50 条
- [21] Automatic Generation of Security Protocols Based on Evolutionary Algorithm PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE OF MANAGEMENT ENGINEERING AND INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 85 - 88
- [22] Verification of Security Protocols VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, 2009, 5403 : 5 - 13
- [23] Verified Interoperable Implementations of Security Protocols ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2008, 31 (01):
- [24] Verifying Implementations of Security Protocols by Refinement VERIFIED SOFTWARE: THEORIES, TOOLS, EXPERIMENTS, 2012, 7152 : 50 - +
- [26] Towards Automatic Property Generation for SoC Security Verification Proceedings - International SoC Design Conference 2022, ISOCC 2022, 2022, : 209 - 210
- [27] Towards Automatic Property Generation for SoC Security Verification 2022 19TH INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2022, : 209 - 210
- [29] Automatic Generation of Sources Lemmas in TAMARIN: Towards Automatic Proofs of Security Protocols COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 3 - 22
- [30] Automatic verification of transparency protocols 2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, 2023, : 107 - 121