共 50 条
- [32] Formal verification logic for hybrid security protocols COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2003, 18 (01): : 17 - 25
- [33] A logical verification method for security protocols based on linear logic and BAN logic SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 417 - 440
- [34] Authentication Tests Based on Distributed Temporal Protocol Logic for the Analysis of Security Protocols INFORMATICS ENGINEERING AND INFORMATION SCIENCE, PT I, 2011, 251 : 214 - 228
- [35] Security analysis and application of Chebyshev Chaotic map in the authentication protocols Dharminder, Dharminder (manndharminder999@gmail.com), 1600, Taylor and Francis Ltd. (43): : 1095 - 1103
- [37] From informal knowledge to formal logic: A realistic case study in medical protocols KNOWLEDGE ENGINEERING AND KNOWLEDGE MANAGEMENT, PROCEEDINGS: ONTOLOGIES AND THE SEMANTIC WEB, 2002, 2473 : 49 - 64
- [38] One-time passwords: Security analysis using BAN logic and integrating with smartcard authentication COMPUTER AND INFORMATION SCIENCES - ISCIS 2003, 2003, 2869 : 794 - 801
- [39] Communication space reduction for formal verification of secure authentication protocols THIRD INTERNATIONAL WORKSHOP ON ADVANCED ISSUES OF E-COMMERCE AND WEB-BASED INFORMATION SYSTEMS, PROCEEDINGS, 2001, : 225 - 227
- [40] A Formal Analysis of Authentication in the TPM FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 111 - +