共 50 条
- [32] Formal Verification and Analysis of Primary Authentication based on 5G-AKA Protocol 2020 SEVENTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2020, : 256 - 261
- [33] Formal Verification of IEEE802.11i WPA-GPG Authentication Protocol INFORMATION TECHNOLOGY AND MOBILE COMMUNICATION, 2011, 147 : 267 - +
- [34] Analysis of LEACH Protocol(s) using Formal Verification 2015 12TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2015, : 254 - 262
- [35] Formal Verification of the Pastry Protocol Using TLA+ DEPENDABLE SOFTWARE ENGINEERING: THEORIES, TOOLS, AND APPLICATIONS, SETTA 2015, 2015, 9409 : 284 - 299
- [36] Formal verification of communication protocol using type theory 2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 1585 - 1593
- [37] Mutual Authentication Protocol for RFID Security using NFSR PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2015, : 255 - 259
- [38] Formal modeling and verification of high-availability protocol for network security appliances AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, PROCEEDINGS, 2007, 4762 : 489 - 500
- [40] Design of an Enhanced Authentication Protocol and Its Verification using AVISPA 2016 3RD INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN INFORMATION TECHNOLOGY (RAIT), 2016, : 404 - 409