共 50 条
- [1] Analysis of two authorization protocols using Colored Petri Nets International Journal of Information Security, 2015, 14 : 221 - 247
- [2] Analysis of Concurrent Security Protocols Using Colored Petri Nets 2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 1, PROCEEDINGS, 2009, : 227 - 230
- [4] Modeling and Analysis of Authentication Protocols. Using Colored Petri Nets PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 443 - 448
- [5] Considering Time in Formal Analysis of Security Protocols Using Colored Petri Nets 2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS SYMPOSIA, PROCEEDINGS, 2008, : 63 - 68
- [6] Specification of timed authentication protocols with colored Petri nets ADVANCED COMPUTER SYSTEMS, PROCEEDINGS, 2002, 664 : 383 - 392
- [7] Using colored Petri nets to simulate object Petri nets International Conference on Computing, Communications and Control Technologies, Vol 5, Proceedings, 2004, : 27 - 31
- [8] An Integrated Model to Analyze Cryptographic Protocols with Colored Petri Nets 11TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2008, : 457 - 460
- [9] A General Model Checking Method of Electronic Transaction Protocols Using Colored Petri Nets HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 2, PROCEEDINGS, 2009, : 298 - 303
- [10] Formal Modeling and Analysis of SIP Using Colored Petri Nets 2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,