共 50 条
- [21] Knowledge Based Approach for Mechanically Verifying Security Protocols 19TH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI-05), 2005, : 1572 - 1573
- [24] Modeling and Verifying Security Protocols Using UML 2 2011 IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON 2011), 2011, : 72 - 79
- [26] Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, 2009, : 109 - 123
- [27] Verifying security protocols with PVS: widening the rank function approach JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2005, 64 (02): : 253 - 284
- [28] Safety and liveness for an RBAC/MAC security model DATA AND APPLICATIONS SECURITY XVII: STATUS AND PROSPECTS, 2004, 142 : 316 - 329
- [30] Secrecy for Bounded Security Protocols: disequality tests and an intruder with existentials lead to undecidability PROCEEDINGS OF THE 2009 FOURTH BALKAN CONFERENCE IN INFORMATICS, 2009, : 22 - 27