共 50 条
[21]
Formal proof of security algorithms based on reachability reduction
[J].
PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT OF DIGITAL ECOSYSTEMS (MEDES 2016),
2016,
:67-72
[22]
A logic for constraint-based security protocol analysis
[J].
2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2006,
:155-168
[23]
Security analysis of an RFID protocol based on insubvertible encryption
[J].
Jisuanji Yanjiu yu Fazhan/Computer Research and Development,
2012, 49 (05)
:958-961
[24]
Analysis of VANET Security Based on Routing Protocol Information
[J].
PROCEEDINGS OF THE 2013 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL AND INFORMATION PROCESSING (ICICIP),
2013,
:134-138
[25]
Security analysis of Kerberos protocol based on SPEAR II
[J].
Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics,
2015, 37 (10)
:2292-2297
[26]
SPIN-based security protocol modeling and analysis
[J].
Nanjing Hangkong Hangtian Daxue Xuebao/Journal of Nanjing University of Aeronautics and Astronautics,
2009, 41 (05)
:672-676
[28]
Disjunctive Transition Relation decomposition for efficient reachability analysis
[J].
HLDVT'06: ELEVENTH ANNUAL IEEE INTERNATIONAL HIGH-LEVEL DESIGN VALIDATION AND TEST WORKSHOP, PROCEEDINGS,
2006,
:29-+