共 50 条
- [41] Browser model for security analysis of browser-based protocols COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, 2005, 3679 : 489 - 508
- [44] Automatically constructing counter-examples of security protocols based on the extended horn logic model 2007, Science Press, 18,Shuangqing Street,Haidian, Beijing, 100085, China (44):
- [45] A Security Threat Analysis and Evaluation Model for Power Field Operation Terminal 2017 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA 2017), 2017, : 382 - 385
- [47] Security analysis on "Strongly secure certificateless key-insulated signature secure in the standard model" 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP), 2015, : 195 - 198
- [48] Security analysis of two unbalancing pairing-free identity-based authenticated key exchange protocols International Journal of Network Security, 2020, 22 (04): : 597 - 601
- [49] SAT-based model-checking for security protocols analysis International Journal of Information Security, 2008, 7 : 3 - 32
- [50] Using Automated Model Analysis for Reasoning about Security of Web Protocols 28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), 2012, : 289 - 298