共 50 条
- [21] Towards verification of timed non-repudiation protocols FORMAL ASPECTS IN SECURITY AND TRUST, 2006, 3866 : 244 - 257
- [22] Automated Design of Non-repudiation Security Protocols 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2318 - +
- [24] Security analysis of (un-) fair non-repudiation protocols FORMAL ASPECTS OF SECURITY, 2003, 2629 : 97 - 114
- [25] Extended-CSP based analysis of non-repudiation protocols Tongxin Xuebao, 2008, 10 (8-18): : 8 - 18
- [27] Non-repudiation Analysis with LYSA EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST, 2009, 297 : 318 - 329
- [28] An extended strand space method for fairness analysis of non-repudiation protocols Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2010, 44 (06): : 16 - 20
- [29] A Formal IT-Security Model for a Weak Fair-Exchange Cooperation with Non-Repudiation Proofs 2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 49 - 56
- [30] Game-based analysis of multi-party non-repudiation protocols CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 642 - +