共 50 条
- [21] Formal proof of security algorithms based on reachability reduction PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT OF DIGITAL ECOSYSTEMS (MEDES 2016), 2016, : 67 - 72
- [22] A logic for constraint-based security protocol analysis 2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2006, : 155 - 168
- [23] Security analysis of an RFID protocol based on insubvertible encryption Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012, 49 (05): : 958 - 961
- [24] Analysis of VANET Security Based on Routing Protocol Information PROCEEDINGS OF THE 2013 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL AND INFORMATION PROCESSING (ICICIP), 2013, : 134 - 138
- [26] SPIN-based security protocol modeling and analysis Nanjing Hangkong Hangtian Daxue Xuebao/Journal of Nanjing University of Aeronautics and Astronautics, 2009, 41 (05): : 672 - 676
- [27] Security analysis of Kerberos protocol based on SPEAR II Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2015, 37 (10): : 2292 - 2297
- [28] Disjunctive Transition Relation decomposition for efficient reachability analysis HLDVT'06: ELEVENTH ANNUAL IEEE INTERNATIONAL HIGH-LEVEL DESIGN VALIDATION AND TEST WORKSHOP, PROCEEDINGS, 2006, : 29 - +