共 50 条
- [2] A comparative study of security protocols validation tools: HERMES vs. AVISPA 8TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U303 - U308
- [4] A Comparative Study of Protocols' Security Verification Tools: Avispa, Scyther, ProVerif, and Tamarin DIGITAL TECHNOLOGIES AND APPLICATIONS, ICDTA 2024, VOL 2, 2024, 1099 : 118 - 128
- [5] Analyzing Internet security protocols SIXTH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING, 2001, : 149 - 159
- [6] Automated Composition of Security Protocols 2009 IEEE 5TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2009, : 251 - +
- [7] Automated design of security protocols CEC: 2003 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-4, PROCEEDINGS, 2003, : 2181 - 2188
- [10] Lightweight Security Protocols for the Internet of Things 2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,