共 50 条
- [31] Model checking wireless sensor network security protocols: TinySec + LEAP + TinyPK Telecommunication Systems, 2009, 40 : 91 - 99
- [32] On perfect and adaptive security in exposure-resilient cryptography ADVANCES IN CRYPTOLOGY-EUROCRYPT 2001, PROCEEDINGS, 2001, 2045 : 301 - 324
- [33] Secure Cryptography Testbed Implementation for SCADA Protocols Security 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2014, : 315 - 320
- [34] Model checking contractual protocols LEGAL KNOWLEDGE AND INFORMATION SYSTEMS, 2000, 64 : 35 - 47
- [35] Model checking of authentication protocols Jisuanji Xuebao/Chinese Journal of Computers, 2003, 26 (02): : 195 - 201
- [36] Model checking guarded protocols 18TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2003, : 361 - 370
- [37] Checking security properties by model checking SOFTWARE TESTING VERIFICATION & RELIABILITY, 2003, 13 (03): : 181 - 196
- [38] Probabilistic Aspects: Checking Security in an Imperfect World TRUSTWORTHY GLOBAL COMPUTING, 2010, 6084 : 348 - +
- [39] Assumption–Commitment Support for CSP Model Checking Journal of Automated Reasoning, 2008, 41 : 365 - 398
- [40] Compiling Probabilistic Model Checking into Probabilistic Planning TWENTY-EIGHTH INTERNATIONAL CONFERENCE ON AUTOMATED PLANNING AND SCHEDULING (ICAPS 2018), 2018, : 150 - 154