共 50 条
- [1] On Logical Foundations of Multilevel Secure Databases Journal of Intelligent Information Systems, 2004, 23 : 271 - 294
- [3] ProInspector: Uncovering Logical Bugs in Protocol Implementations 9TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P 2024, 2024, : 617 - 632
- [4] Union and Intersection Types for Secure Protocol Implementations THEORY OF SECURITY AND APPLICATIONS, 2012, 6993 : 1 - 28
- [5] Logical verification of secure electronic transactions protocol Ruan Jian Xue Bao/Journal of Software, 2000, 11 (03): : 346 - 362
- [7] Proved Generation of Implementations from Computationally Secure Protocol Specifications PRINCIPLES OF SECURITY AND TRUST, POST 2013, 2013, 7796 : 63 - 82
- [9] Logical key tree based secure multicast protocol with copyright protection 19th International Conference on Advanced Information Networking and Applications, Vol 1, Proceedings: AINA 2005, 2005, : 279 - 284
- [10] Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations 43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 107 - 124