共 50 条
- [41] Compositional analysis of authentication protocols PROGRAMMING LANGUAGES AND SYSTEMS, 2004, 2986 : 140 - 154
- [42] A formal analysis of non-repudiation protocols based on first-order logic ISTM/2007: 7TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-7, CONFERENCE PROCEEDINGS, 2007, : 6580 - 6583
- [43] Study Of RFID Authentication Protocols 2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
- [44] Extending BAN Logic for Reasoning with Modern PKI-based Protocols 2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2008, : 190 - +
- [45] Formal analysis of meeting protocols MULTI-AGENT AND MULTI-AGENT-BASED SIMULATION, 2005, 3415 : 114 - 129
- [46] An encapsulated authentication logic for reasoning about key distribution protocols 18th IEEE Computer Security Foundations Workshop, Proceedings, 2005, : 48 - 61
- [48] Hidden-ID authentication scheme and its SVO-Logic based formal analysis CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 781 - +
- [49] Where you are Based Authentication: An Improved Security Protocol Using BAN Logic PROCEEDINGS OF THE 7TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2008, : 153 - 162