共 50 条
- [21] Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, 2009, : 109 - 123
- [22] Verifying security protocols with PVS: widening the rank function approach JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2005, 64 (02): : 253 - 284
- [23] Unbounded Verification, Falsification, and Characterization of Security Protocols by Pattern Refinement CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 119 - 128
- [24] Verifying security Protocols for sensor networks using algebraic specification techniques ALGEBRAIC INFORMATICS, 2007, 4728 : 247 - +
- [25] Verifying multicast-based security protocols using the inductive method International Journal of Information Security, 2015, 14 : 187 - 204
- [27] A Security Calculus of Concurrent Objects for Verifying Ad Hoc Network protocols NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 232 - 239
- [28] An abstraction and refinement framework for verifying security protocols based on logic programming ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 166 - +