共 50 条
- [41] Distance bounding protocols: Authentication logic analysis and collusion attacks SECURE LOCALIZATION AND TIME SYNCHRONIZATION FOR WIRELESS SENSOR AND AD HOC NETWORKS, 2007, 30 : 279 - +
- [42] Provable security for cryptographic protocols - Exact analysis and engineering applications 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 45 - 58
- [43] Automatic verification of cryptographic protocols through compositional analysis techniques TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, 1999, 1579 : 148 - 162
- [46] A bisimulation method for cryptographic protocols PROGRAMMING LANGUAGES AND SYSTEMS, 1998, 1381 : 12 - 26
- [49] Searching for shapes in cryptographic protocols TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PROCEEDINGS, 2007, 4424 : 523 - 537