共 50 条
- [31] Logic for verifying public-key cryptographic protocols IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1997, 144 (01): : 28 - 32
- [32] Modeling of cryptographic protocols in first-order logic PROCEEDINGS OF THE ISSAT INTERNATIONAL CONFERENCE ON MODELING OF COMPLEX SYSTEMS AND ENVIRONMENTS, PROCEEDINGS, 2007, : 66 - +
- [33] Collusion analysis of cryptographic protocols IEEE GLOBECOM 1996 - CONFERENCE RECORD, VOLS 1-3: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 1 - 5
- [34] Formal analysis of a probabilistic knowledge communication framework ADVANCES IN ARTIFICIAL INTELLIGENCE - IBERAMIA-SBIA 2006, PROCEEDINGS, 2006, 4140 : 138 - 148
- [35] An approach to the formal verification of the two-party cryptographic protocols Oper Syst Rev ACM, 4 (48-51):
- [37] ASAP: Algorithm Substitution Attacks on Cryptographic Protocols ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 712 - 726
- [39] A Study on Fine-Grained Security Properties of Cryptographic Protocols for Formal Analysis Method with Reasoning 2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, : 210 - 215
- [40] Formal verification logic for hybrid security protocols COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2003, 18 (01): : 17 - 25