共 50 条
- [1] Protocol Derivation System for the Needham-Schroeder Family 2011 6TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2011, : 836 - 840
- [2] Formal analysis of Needham-Schroeder protocol Ruan Jian Xue Bao/Journal of Software, 2002, 13 (SUPPL.): : 86 - 92
- [3] Needham-Schroeder goes to court COMPUTER SYSTEMS: THEORY, TECHNOLOGY AND APPLICATIONS: A TRIBUTE TO ROGER NEEDHAM, 2004, : 77 - 78
- [4] Model Checking of Needham-Schroeder Protocol Using UPPAAL 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
- [6] Using backward strategy to the Needham-Schroeder public key protocol verification ARTIFICIAL INTELLIGENCE AND SECURITY IN COMPUTING SYSTEMS, 2003, 752 : 249 - 259
- [7] Proving Authentication Property of Modified Needham-Schroeder Protocol with Logic of Events PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL APPLICATIONS (CISIA 2015), 2015, 18 : 379 - 383
- [9] Model checking analysis of needham-schroeder public-key protocol Ruan Jian Xue Bao/Journal of Software, 2000, 11 (10): : 1348 - 1352
- [10] Improvement and security analysis on symmetric key authentication protocol Needham-Schroeder APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 1289 - 1293