-
1
Correcting the security definition of the Bellare-Rogaway 3PKD model
Published 2007-01-01Subjects: Get full text
Article -
2
Analysis and improvement of sensor networks security protocol
Published 2011-01-01Subjects: Get full text
Article -
3
Optimization and Security Analysis of Interconnected Security Control Based on Semantic of Process Communication
Published 2021-09-01Subjects: “…formal analysis…”
Get full text
Article -
4
Security analysis of security protocol Swift implementations based on computational model
Published 2018-09-01Subjects: Get full text
Article -
5
Modeling and analysis of multi-party non-repudiation protocols with extended-CSP approach
Published 2012-11-01Subjects: “…formal analysis…”
Get full text
Article -
6
Analysis and improvement of the BACnet/IP based on identity authentication
Published 2024-03-01Subjects: Get full text
Article -
7
Formal modeling and security analysis method of security protocol based on CPN
Published 2021-09-01Subjects: Get full text
Article -
8
Android complex information flow analysis method based on communicating sequential process
Published 2021-10-01Subjects: Get full text
Article -
9
A Critique of the Book the History of Arabic Literature in Hadith Era
Published 2017-03-01Subjects: Get full text
Article -
10
Analysis of provably secure on-demand source routing in MANET
Published 2009-01-01Subjects: Get full text
Article -
11
Research on certificateless anonymous authentication and key agreement scheme of vehicle network based on CPN
Published 2024-06-01Subjects: Get full text
Article -
12
Research on formal security policy model specification and its formal analysis
Published 2006-01-01Subjects: Get full text
Article -
13
SAT-based lazy formal analysis method for security protocols
Published 2014-11-01Subjects: Get full text
Article