共 37 条
[2]
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[3]
ARPKI: Attack Resilient Public-Key Infrastructure
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:382-393
[4]
Bhargavan K., 2022, P 29 ACM C COMPUTER
[5]
Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:483-502
[6]
Blanchet B., 2021, ProVerif 2.04: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial
[7]
Blanchet B, 2022, P IEEE S SECUR PRIV, P69, DOI [10.1109/SP46214.2022.00013, 10.1109/SP46214.2022.9833653]
[8]
Symbolic and Computational Mechanized Verification of the ARINC823 Avionic Protocols
[J].
2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF),
2017,
:68-82
[9]
Blanchet B, 2016, Foundations and Trends® in Privacy and Security, V1, P1, DOI [10.1561/3300000004, DOI 10.1561/3300000004]