共 50 条
- [1] Security analysis of TLS protocol implementations based on model checking Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2021, 43 (03): : 839 - 846
- [4] The Application of Model Checking in Validating Information System Software Security 2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL III, 2010, : 448 - 451
- [6] Security analysis of multi-party quantum private comparison protocol by model checking MODERN PHYSICS LETTERS B, 2015, 29 (18):
- [8] Model Checking of Needham-Schroeder Protocol Using UPPAAL 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
- [9] Parallel Bounded Model Checking of Security Protocols PARALLEL PROCESSING AND APPLIED MATHEMATICS (PPAM 2013), PT I, 2014, 8384 : 224 - 234
- [10] Model checking security vulnerabilities in software design 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,