共 50 条
- [31] A new formal analysis method for security protocols Advanced Computer Technology, New Education, Proceedings, 2007, : 724 - 729
- [32] A Formal Analysis of Data Distribution Service Security PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 716 - 727
- [34] A Comprehensive Formal Security Analysis of OAuth 2.0 CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1204 - 1215
- [35] Formal security analysis with interacting state machines COMPUTER SECURITY - ESORICS 2002, PROCEEDINGS, 2002, 2502 : 212 - 228
- [36] Formal Security Analysis of Smart Embedded Systems 32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, : 1 - 15
- [37] Formal analysis methods of network security design SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 313 - 318
- [38] Formal Security Analysis of Traditional and Electronic Exams E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2014, 2015, 554 : 294 - 318
- [39] A Formal Security Analysis of the Signal Messaging Protocol Journal of Cryptology, 2020, 33 : 1914 - 1983