共 50 条
- [2] Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs 2010 23RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2010, : 231 - 245
- [3] Machine-Checked Proofs for Realizability Checking Algorithms VERIFIED SOFTWARE: THEORIES, TOOLS, AND EXPERIMENTS, 2016, 9593 : 110 - 123
- [4] Machine-Checked Proofs of Privacy for Electronic Voting Protocols 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 993 - 1008
- [5] Automated Machine-Checked Hybrid System Safety Proofs INTERACTIVE THEOREM PROVING, PROCEEDINGS, 2010, 6172 : 259 - +
- [6] Machine-checked proofs for electronic voting: privacy and verifiability for Belenios IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018), 2018, : 298 - 312
- [7] Machine-Checked Proofs of Accountability: How to sElect Who is to Blame COMPUTER SECURITY - ESORICS 2023, PT III, 2024, 14346 : 471 - 491
- [8] A Certificate Infrastructure for Machine-Checked Proofs of Conditional Information Flow PRINCIPLES OF SECURITY AND TRUST, POST 2012, 2012, 7215 : 369 - 389
- [9] Machine-checked ZKP for NP relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 2587 - 2600