共 50 条
- [3] Compiling and verifying security protocols LOGIC FOR PROGRAMMING AND AUTOMATED REASONING, PROCEEDINGS, 2000, 1955 : 131 - 160
- [6] Verifying the independence of security protocols ICCP 2007: IEEE 3RD INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2007, : 155 - +
- [7] Verifying security protocols by knowledge analysis Int. J. Secur. Netw., 2008, 3 (183-192): : 183 - 192
- [8] Verifying Parameterized Timed Security Protocols FM 2015: FORMAL METHODS, 2015, 9109 : 342 - 359
- [9] TAuth: Verifying Timed Security Protocols FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2014, 2014, 8829 : 300 - 315
- [10] Verifying security protocols: An application of CSP COMMUNICATING SEQUENTIAL PROCESSES: THE FIRST 25 YEARS, 2005, 3525 : 243 - 263