共 50 条
- [42] Modelling Attacker's Knowledge for Cascade Cryptographic Protocols ABSTRACT STATE MACHINES, B AND Z, PROCEEDINGS, 2008, 5238 : 251 - 264
- [43] Formal proofs of cryptographic security of Diffie-Hellman-based protocols TRUSTWORTHY GLOBAL COMPUTING, 2008, 4912 : 312 - +
- [44] Symbolic trace analysis of cryptographic protocols AUTOMATA LANGUAGES AND PROGRAMMING, PROCEEDING, 2001, 2076 : 667 - 681
- [45] Cryptographic Protocols Analysis in Event B PERSPECTIVES OF SYSTEMS INFORMATICS, 2010, 5947 : 282 - +
- [46] Non interference for the analysis of cryptographic protocols AUTOMATA LANGUAGES AND PROGRAMMING, 2000, 1853 : 354 - 372
- [48] A Performance Analysis Model for Cryptographic Protocols ICSIT 2011: THE 2ND INTERNATIONAL CONFERENCE ON SOCIETY AND INFORMATION TECHNOLOGIES, 2011, : 80 - 85
- [49] Formal analysis of PUFs-based authentication protocols in logic of events theory Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2024, 52 (02): : 69 - 76
- [50] CVS: a compiler for the analysis of cryptographic protocols PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, : 203 - 212