共 50 条
- [21] Formal Verification of Security Protocols Using Spin 2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2016, : 637 - 642
- [22] Improving Automatic Verification of Security Protocols with XOR FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2009, 5885 : 107 - 126
- [24] Integrated Specification and Verification of Security Protocols and Policies 2011 IEEE 24TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2011, : 18 - 32
- [25] Formal verification logic for hybrid security protocols COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2003, 18 (01): : 17 - 25
- [26] Security of DSA type batch verification protocols Chinese Journal of Electronics, 1999, 8 (02): : 175 - 177
- [27] An Extended UML Method for the Verification of Security Protocols 2014 19TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2014), 2014, : 19 - 28
- [28] Some Remarks on Security Protocols Verification Tools INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY - ISAT 2016 - PT II, 2017, 522 : 65 - 75
- [29] Security Verification for Authentication and Key Exchange Protocols 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 507 - 512
- [30] Automated verification of selected equivalences for security protocols JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2008, 75 (01): : 3 - 51