共 100 条
[31]
Basin D., 2018, Handbook of Model Checking, P727, DOI DOI 10.1007/978-3-319-10575-8_22
[32]
A Formal Analysis of 5G Authentication
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:1383-1396
[34]
Behrmann G., 2006, A tutorial on Uppaal 4.0
[35]
Formal Verification of the Security for Dual Connectivity in LTE
[J].
2015 IEEE/ACM 3RD FME WORKSHOP ON FORMAL METHODS IN SOFTWARE ENGINEERING,
2015,
:13-19
[36]
Bengtsson J., 1996, Hybrid Systems III. Verification and Control, P232, DOI 10.1007/BFb0020949
[37]
Blanchet B., 2018, Tech. Rep, P05
[38]
Blanchet Bruno, 2016, Foundations and Trends in Privacy and Security, V1, P1, DOI DOI 10.1561/3300000004
[40]
A Survey on Security Aspects for LTE and LTE-A Networks
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2014, 16 (01)
:283-302