共 50 条
- [1] Verified Interoperable Implementations of Security Protocols ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2008, 31 (01):
- [2] Verifying Implementations of Security Protocols by Refinement VERIFIED SOFTWARE: THEORIES, TOOLS, EXPERIMENTS, 2012, 7152 : 50 - +
- [3] Provable security for cryptographic protocols - Exact analysis and engineering applications 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 45 - 58
- [4] Towards provable security for data transmission protocols in sensor network J. Inf. Sci. Eng., 2009, 1 (319-333):
- [7] AnBx: Automatic generation and verification of security protocols implementations Lect. Notes Comput. Sci., (156-173):
- [9] AnBx: Automatic Generation and Verification of Security Protocols Implementations FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 156 - 173
- [10] Verified reference implementations of WS-security protocols WEB SERVICES AND FORMAL METHODS, PROCEEDINGS, 2006, 4184 : 88 - 106