共 50 条
[41]
Cryptographic protocol security analysis based on bounded constructing algorithm
[J].
Science in China Series F,
2006, 49
:26-47
[43]
Security analysis of Kerberos protocol based on the strand space model
[J].
Gaojishu Tongxin,
2008, 9 (909-914)
:909-914
[48]
Security Analysis of SKI Protocol
[J].
2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC),
2014,
:199-203
[49]
Analysis of a security protocol in μCRL
[J].
FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS,
2002, 2495
:396-400
[50]
A security analysis of the OAuth protocol
[J].
2013 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM),
2013,
:271-276