共 50 条
- [21] A tool for lazy verification of security protocols 16TH ANNUAL INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2001), PROCEEDINGS, 2001, : 373 - 376
- [22] Comparative Study of Security Protocols to Enhance Security over Internet 2015 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES ACCT 2015, 2015, : 552 - 556
- [23] Taxonomy and analysis of security protocols for Internet of Things FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 89 : 110 - 125
- [24] Automated Analysis of Secure Internet of Things Protocols 33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 238 - 249
- [25] Migration of Internet security protocols to the IPSEC framework 36TH ANNUAL 2002 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2002, : 134 - 143
- [26] Computationally sound, automated proofs for security protocols PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2005, 3444 : 157 - 171
- [27] Automated verification of selected equivalences for security protocols LICS 2005: 20TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE - PROCEEDINGS, 2005, : 331 - 340
- [29] Automated analysis of security protocols with global state 2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 163 - 178
- [30] Decision Process for Automated Selection of Security Protocols 2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2, 2008, : 212 - 218