共 50 条
- [21] ASAP: Algorithm Substitution Attacks on Cryptographic Protocols ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 712 - 726
- [22] Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks 2009 5TH IEEE WORKSHOP ON SECURE NETWORK PROTOCOLS, 2009, : 43 - +
- [23] Automata-based analysis of recursive cryptographic protocols STACS 2004, PROCEEDINGS, 2004, 2996 : 382 - 393
- [24] On Cryptographic Approaches for Detecting GNSS Spoofing Attacks 2024 IEEE SPACE, AEROSPACE AND DEFENCE CONFERENCE, SPACE 2024, 2024, : 384 - 388
- [25] Blockwise p-Tampering Attacks on Cryptographic Primitives, Extractors, and Learners THEORY OF CRYPTOGRAPHY, TCC 2017, PT II, 2017, 10678 : 245 - 279
- [26] Process algebraic frameworks for the specification and analysis of cryptographic protocols MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 2003, PROCEEDINGS, 2003, 2747 : 46 - 67
- [27] FSM Simulation of Cryptographic Protocols Using Algebraic Processor PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON DEPENDABILITY AND COMPLEX SYSTEMS DEPCOS-RELCOMEX, 2014, 286 : 189 - 198
- [28] A formal analysis for capturing replay attacks in cryptographic protocols ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 150 - +
- [30] Automatic detection of attacks on cryptographic protocols: A case study DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, PROCEEDINGS, 2005, 3548 : 69 - 84