共 50 条
- [21] Parallel Bounded Model Checking of Security Protocols PARALLEL PROCESSING AND APPLIED MATHEMATICS (PPAM 2013), PT I, 2014, 8384 : 224 - 234
- [23] Algebra model and security analysis for cryptographic protocols SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (02): : 199 - 220
- [24] An intruder model for verifying liveness in security protocols Proc. Fourth ACM Workshop Formal Methods Secur. Eng. FMSE Conf.Comput. Commun. Secur., 2006, (23-32):
- [25] A generic model for symbolic analyzing security protocols Fifth International Conference on Computer and Information Technology - Proceedings, 2005, : 680 - 684
- [27] Towards a Game-Theoretic Security Analysis of Off-Chain Protocols 2023 IEEE 36TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, CSF, 2023, : 107 - 122
- [28] Game semantics and subtyping 15TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2000, : 192 - 203
- [29] Probabilistic game semantics 15TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2000, : 204 - 213