共 28 条
[1]
3GPP, 2018, TS 33.501 Security architecture and procedures for 5G system, v15.34.1
[3]
[Anonymous], 2012, Proceedings of the 2012 ACM Conference on Computer and Communications Security
[4]
Analysing Unlinkability and Anonymity Using the Applied Pi Calculus
[J].
2010 23RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF),
2010,
:107-121
[5]
A Computationally Complete Symbolic Attacker for Equivalence Properties
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:609-620
[6]
Bana G, 2012, LECT NOTES COMPUT SC, V7215, P189, DOI 10.1007/978-3-642-28641-4_11
[7]
Basin D., 2018, ACM C COMP COMM SEC
[9]
Blanchet B., PROVERIF CRYPTOGRAPH