共 50 条
- [1] Logic of Events for Proving Security Properties of Protocols WISM: 2009 INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, : 519 - +
- [2] Security Verification for Authentication and Key Exchange Protocols INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 1 - 11
- [3] Security Verification for Authentication and Key Exchange Protocols 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 507 - 512
- [7] Analyzing the security flaws of internet key exchange protocols Ruan Jian Xue Bao/Journal of Software, 2002, 13 (06): : 1173 - 1177
- [8] Security of Group Key Exchange Protocols with Different Passwords 2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, 2009, : 147 - 152
- [9] A Brief Overview on Security Challenges and Protocols in Internet of Things Application 2022 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS), 2022, : 463 - 469
- [10] How to Formally Model Features of Network Security Protocols INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 423 - 431