共 50 条
- [43] Developing Security Protocols by Refinement PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 361 - 374
- [44] Sessions and Separability in Security Protocols PRINCIPLES OF SECURITY AND TRUST, POST 2013, 2013, 7796 : 267 - 286
- [45] Timed Analysis of Security Protocols INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY - ISAT 2016 - PT II, 2017, 522 : 53 - 63
- [48] Formal Verification of e-Reputation Protocols FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 247 - 261
- [49] Formal Verification of Consensus Protocols: Survey and Perspective Ruan Jian Xue Bao/Journal of Software, 2023, 34 (11): : 4989 - 5007
- [50] On Formal Analysis of Cryptographic Protocols and Supporting Tool CHINESE JOURNAL OF ELECTRONICS, 2010, 19 (02): : 223 - 228