共 22 条
[3]
Bistarelli S., 2017, Proceedings of the Symposium on Applied Computing - SAC, V17, P1836, DOI 10.1145/3019612.3019841
[5]
Automatic Verification of Security Protocols in the Symbolic Model: The Verifier Proverif
[J].
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
2014, 8604
:54-87
[7]
Boneh D, 2012, LECT NOTES COMPUT SC, V7658, P1, DOI 10.1007/978-3-642-34961-4_1
[8]
Chaieb M., 2018, P EUR MED MIDDL E C, P16
[10]
Dreier J, 2012, IEEE ICC, P6710, DOI 10.1109/ICC.2012.6364938