共 50 条
- [2] Formal Verification of IEEE 802.16 Security Sublayer Using Scyther Tool 2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, 2009, : 172 - +
- [3] Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther 2016 24TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING (PDP), 2016, : 553 - 557
- [4] Formal Analysis of OTag Protocol on Authentication and Confidentiality PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION TECHNOLOGIES & APPLICATIONS (ICUT 2009), 2009, : 224 - 229
- [5] Formal Analysis of the Signal Protocol using the Scyther Tool 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
- [6] A Formal Description and Verification of Authentication Protocol DCABES 2008 PROCEEDINGS, VOLS I AND II, 2008, : 735 - 740
- [7] Formal verification of security properties of the Lightweight Authentication and Key Exchange Protocol for Federated IoT devices PROCEEDINGS OF THE 2022 17TH CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENCE SYSTEMS (FEDCSIS), 2022, : 617 - 625
- [8] Design and Formal Verification of a VANET Lightweight Authentication Protocol 2018 IEEE 18TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2018, : 513 - 517
- [9] An Improved Secure Authentication Protocol for WiMAX with Formal Verification ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 407 - +
- [10] Towards a formal verification of an authentication protocol using non-monotonic logic PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 545 - 550