共 50 条
- [31] A survey on computationally sound formal analysis of cryptographic protocols Jisuanji Xuebao/Chinese Journal of Computers, 2014, 37 (05): : 993 - 1016
- [32] Decidable analysis of cryptographic protocols with products and modular exponentiation PROGRAMMING LANGUAGES AND SYSTEMS, 2004, 2986 : 355 - 369
- [33] Automated analysis of cryptographic protocols using Mur phi 1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, : 141 - 151
- [34] Symbolic Analysis of Cryptographic Protocols Containing Bilinear Pairings 2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 63 - 77
- [36] A problem solving mechanism for formal analysis of cryptographic Protocols NEW ADVANCES IN SIMULATION, MODELLING AND OPTIMIZATION (SMO '07), 2007, : 95 - 98
- [37] Automata-based analysis of recursive cryptographic protocols STACS 2004, PROCEEDINGS, 2004, 2996 : 382 - 393
- [38] Logic-based formal analysis of cryptographic protocols ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 300 - +
- [39] Decision procedures for the analysis of cryptographic protocols by logics of belief Proceedings of the Computer Security Foundations Workshop, 1999, : 44 - 54
- [40] Collusion Resistant Watermarking Schemes for Cryptographic Functionalities ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT I, 2019, 11921 : 371 - 398