共 50 条
- [1] Application of formal methods for analysis of authentication protocols DISTRIBUTED COMPUTING - IWDC 2004, PROCEEDINGS, 2004, 3326 : 536 - 536
- [2] Formal analysis of PUFs-based authentication protocols in logic of events theory Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2024, 52 (02): : 69 - 76
- [5] Analysis of Authentication Protocols Based on Rubin Logic 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4680 - +
- [6] An Improved Security Protocol Formal Analysis with BAN Logic ECBI: 2009 INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE AND BUSINESS INTELLIGENCE, PROCEEDINGS, 2009, : 102 - +
- [7] Formal Analysis of An Efficient Handover Authentication Scheme for EAP-based Wireless Networks with Extending BAN Logic FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY III, PTS 1-3, 2013, 401 : 1864 - 1867
- [8] An extensive formal analysis of multi-factor authentication protocols IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018), 2018, : 1 - 15
- [10] Logic-based formal analysis of cryptographic protocols ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 300 - +