共 30 条
[1]
Abadi M, 2004, LECT NOTES COMPUT SC, V2986, P340
[3]
Arapinis M., 2012, Proceedings of the 2012 ACM Conference on Computer and Communications Security, DOI 10.1145/2382196.2382221
[4]
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[5]
Basin D., 2015, IEEE SECURI IN PRESS
[6]
An efficient cryptographic protocol verifier based on prolog rules
[J].
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2001,
:82-96
[7]
Blanchet B., AUTOMATIC VERIFICATI
[8]
Blanchet B., PROVERIF 1 88 AUTOMA
[9]
Automated formal analysis of a protocol for secure file sharing on untrusted storage
[J].
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2008,
:417-+