共 50 条
- [1] Logic of Events for Proving Security Properties of Protocols WISM: 2009 INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, : 519 - +
- [2] Proving security protocols correct Proceedings - Symposium on Logic in Computer Science, 1999, : 370 - 381
- [3] Exploiting Symmetries When Proving Equivalence Properties for Security Protocols PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 905 - 922
- [5] LoET-E: A Refined Theory for Proving Security Properties of Cryptographic Protocols IEEE ACCESS, 2019, 7 : 59871 - 59883
- [7] Formalizing and Proving a Typing Result for Security Protocols in Isabelle/HOL 2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 451 - 463
- [8] Proving security protocols with model checkers by data independence techniques 11TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP - PROCEEDINGS, 1998, : 84 - 95
- [9] A framework for proving the security of data transmission protocols in sensor network INTELLIGENCE AND SECURITY INFORMATICS, 2007, 4430 : 288 - +