共 50 条
[32]
Security Analysis in Probabilistic Distributed Protocols via Bounded Reachability
[J].
TRUSTWORTHY GLOBAL COMPUTING, TGC 2013,
2013, 8358
:182-197
[33]
Performance analysis of the REAchability protocol for IPv6 multihoming
[J].
NEXT GENERATION TELETRAFFIC AND WIRED/WIRELESS ADVANCED NETWORKING, PROCEEDINGS,
2007, 4712
:443-+
[35]
PROTOCOL VERIFICATION ALGORITHM USING REDUCED REACHABILITY ANALYSIS.
[J].
Transactions of the Institute of Electronics and Communication Engineers of Japan. Section E,
1983, E66 (02)
:88-93
[36]
Analysis and Improvement of Mobile Payment Security Based on SET Protocol
[J].
MATERIALS AND COMPUTATIONAL MECHANICS, PTS 1-3,
2012, 117-119
:615-618
[39]
Cryptographic protocol security analysis based on bounded constructing algorithm
[J].
SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES,
2006, 49 (01)
:26-47
[40]
Security analysis of TLS protocol implementations based on model checking
[J].
Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics,
2021, 43 (03)
:839-846