共 73 条
[51]
Godskesen J.C., Formal verification of the ARAN protocol using the applied picalculus, WITS 2006, pp. 99-113, (2006)
[52]
Gordon A., Jeffrey A., Types and effects for asymmetric cryptographic protocols, Journal of Computer Security, 12, 3-4, pp. 435-484, (2004)
[53]
Goubault-Larrecq J., Deciding H1 by resolution, Information Processing Letters, 95, 3, pp. 401-408, (2005)
[54]
Goubault-Larrecq J., Parrennes F., Cryptographic protocol analysis on real C code, VMCAI 2005. LNCS, 3385, pp. 363-379, (2005)
[55]
Heather J., Lowe G., Schneider S., How to prevent type flaw attacks on security protocols, CSFW 2000, pp. 255-268, (2000)
[56]
Kallahalla M., Riedel E., Swaminathan R., Wang Q., Fu K., Plutus: Scalable secure file sharing on untrusted storage, FAST 2003, pp. 29-42, (2003)
[57]
Khurana H., Hahm H.S., Certified mailing lists, ASIACCS 2006, pp. 46-58, (2006)
[58]
Kremer S., Ryan M.D., Analysis of an electronic voting protocol in the applied pi calculus, ESOP 2005. LNCS, 3444, pp. 186-200, (2005)
[59]
Kusters R., Truderung T., Reducing protocol analysis with XOR to the XOR-free case in the Horn theory based approach, CCS 2008, pp. 129-138, (2008)
[60]
Kusters R., Truderung T., Using ProVerif to analyze protocols with Diffie-Hellman exponentiation, CSF 2009, pp. 157-171, (2009)