共 50 条
- [31] Verifying Implementations of Security Protocols by Refinement VERIFIED SOFTWARE: THEORIES, TOOLS, EXPERIMENTS, 2012, 7152 : 50 - +
- [32] Security for Distributed SOA at the Tactical Edge MILITARY COMMUNICATIONS CONFERENCE, 2010 (MILCOM 2010), 2010, : 13 - 18
- [34] Security Modeling of SOA System Using Security Intent DSL SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 3, 2011, 181 : 176 - 190
- [35] Security analysis of security protocol Swift implementations based on computational model Tongxin Xuebao/Journal on Communications, 2018, 39 (09): : 178 - 190
- [36] A Security Analysis Method for Security Protocol Implementations Based on Message Construction APPLIED SCIENCES-BASEL, 2018, 8 (12):
- [37] Security Testing of Session Initiation Protocol Implementations ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 1 (02): : 91 - 103
- [38] Does Coupling Affect the Security of Masked Implementations? CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, 2017, 10348 : 1 - 18
- [39] Hardware Implementations of Pairings at Updated Security Levels SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2021), 2022, 13173 : 189 - 209