共 50 条
- [1] Compositional analysis of contract signing protocols 18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2005, : 94 - 110
- [3] Web security: Authentication protocols and their analysis New Generation Computing, 2001, 19 : 283 - 299
- [5] Analysis of typed analyses of authentication protocols 18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2005, : 112 - 125
- [8] VANET authentication protocols: security analysis and a proposal JOURNAL OF SUPERCOMPUTING, 2023, 79 (02): : 2153 - 2179
- [10] Security Analysis of Some RFID Authentication Protocols 2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 386 - 389