共 50 条
- [21] Using Backward Induction Techniques in (Timed) Security Protocols Verification COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 265 - 276
- [22] SPECIFYING AND PROVING COMMUNICATION CLOSEDNESS IN PROTOCOLS PROTOCOL SPECIFICATION, TESTING AND VERIFICATION, XIII, 1993, 16 : 323 - 339
- [23] A Method for Proving Unlinkability of Stateful Protocols 2020 IEEE 33RD COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2020), 2020, : 169 - 183
- [25] Formalizing and Proving Privacy Properties of Voting Protocols Using Alpha-Beta Privacy COMPUTER SECURITY - ESORICS 2019, PT I, 2019, 11735 : 535 - 555
- [27] Handling algebraic properties in automatic analysis of security protocols THEORETICAL ASPECTS OF COMPUTING - ICTAC 2006, 2006, 4281 : 153 - 167
- [28] Using SPIN to verify security properties of cryptographic protocols MODEL CHECKING SOFTWARE, PROCEEDINGS, 2002, 2318 : 187 - 204
- [29] Proving group protocols secure against eavesdroppers AUTOMATED REASONING, PROCEEDINGS, 2008, 5195 : 116 - +