共 50 条
- [41] Cryptographic protocol security analysis based on bounded constructing algorithm Science in China Series F, 2006, 49 : 26 - 47
- [43] Security analysis of Kerberos protocol based on the strand space model Gaojishu Tongxin, 2008, 9 (909-914): : 909 - 914
- [47] A security analysis of the OAuth protocol 2013 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM), 2013, : 271 - 276
- [48] Security Analysis of SKI Protocol 2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 199 - 203
- [49] Analysis of a security protocol in μCRL FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2002, 2495 : 396 - 400