共 50 条
- [41] Timed Analysis of Security Protocols INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY - ISAT 2016 - PT II, 2017, 522 : 53 - 63
- [42] A decidable analysis of security protocols EXPLORING NEW FRONTIERS OF THEORETICAL INFORMATICS, 2004, 155 : 21 - 21
- [44] Automated design of security protocols CEC: 2003 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-4, PROCEEDINGS, 2003, : 2181 - 2188
- [45] Proving security protocols correct Proceedings - Symposium on Logic in Computer Science, 1999, : 370 - 381
- [47] On evaluating the performance of security protocols PARALLEL COMPUTING TECHNOLOGIES, 2005, 3606 : 1 - 15
- [48] CryptoNET: Security Management Protocols ADVANCES IN DATA NETWORKS, COMMUNICATIONS, COMPUTERS, 2010, : 15 - 20
- [49] Comparison of wireless security protocols CCCT 2003, VOL 5, PROCEEDINGS: COMPUTER, COMMUNICATION AND CONTROL TECHNOLOGIES: II, 2003, : 94 - 99
- [50] Analyzing Internet security protocols SIXTH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING, 2001, : 149 - 159