共 50 条
- [32] Automatic Verification of Security Protocols in the Symbolic Model: The Verifier Proverif Blanchet, Bruno (Bruno.Blanchet@inria.fr), 1600, Springer Verlag (8604):
- [33] Computational Soundness of Coinductive Symbolic Security under Active Attacks THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 539 - 558
- [35] Design Requirements to Counter Parallel Session Attacks in Security Protocols 2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 298 - 305
- [36] Detecting Failed Attacks on Human-Interactive Security Protocols SECURITY PROTOCOLS XXIV, 2017, 10368 : 181 - 197
- [37] Security and efficiency in authentication protocols resistant to password guessing attacks LCN'97 - 22ND ANNUAL CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 1997, : 245 - 252
- [38] On the security of Girault key agreement protocols against active attacks IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (05): : 1181 - 1189
- [39] Migration of Internet security protocols to the IPSEC framework 36TH ANNUAL 2002 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2002, : 134 - 143