共 50 条
- [32] Security Analysis in Probabilistic Distributed Protocols via Bounded Reachability TRUSTWORTHY GLOBAL COMPUTING, TGC 2013, 2013, 8358 : 182 - 197
- [33] Performance analysis of the REAchability protocol for IPv6 multihoming NEXT GENERATION TELETRAFFIC AND WIRED/WIRELESS ADVANCED NETWORKING, PROCEEDINGS, 2007, 4712 : 443 - +
- [35] PROTOCOL VERIFICATION ALGORITHM USING REDUCED REACHABILITY ANALYSIS. Transactions of the Institute of Electronics and Communication Engineers of Japan. Section E, 1983, E66 (02): : 88 - 93
- [36] Analysis and Improvement of Mobile Payment Security Based on SET Protocol MATERIALS AND COMPUTATIONAL MECHANICS, PTS 1-3, 2012, 117-119 : 615 - 618
- [39] Cryptographic protocol security analysis based on bounded constructing algorithm SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2006, 49 (01): : 26 - 47
- [40] Security analysis of TLS protocol implementations based on model checking Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2021, 43 (03): : 839 - 846