共 26 条
- [21] Application of the XTT rule-based model for formal design and verification of internet security systems COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2007, 4680 : 81 - +
- [22] Web GUI for Automating the Formal Verification of Security Protocols using Casper & FDR4 PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE (ECAI-2019), 2019,
- [24] Harnessing the sun's powerHybrid photosynthesis might become a key technology to address the energy crisis and food security challenges The EMBO Reports, 2022, 23 (11):
- [25] Security Enhancement of Handover Key Management Based on Media Access Control Address in 4G LTE Networks 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2015, : 868 - 872
- [26] 4-4 the design and application of a mimetic network environment construction system: Security verification environment building system and contribution to human resource development Journal of the National Institute of Information and Communications Technology, 2016, 63 (02): : 93 - 101