-
1
Automatic proof of resistance of denial of service attacks in protocols
Published 2012-03-01Subjects: Get full text
Article -
2
Extended-CSP based analysis of non-repudiation protocols
Published 2008-01-01Subjects: Get full text
Article -
3
Coding-aware secure routing for multi-hop wireless networks
Published 2012-06-01Subjects: Get full text
Article -
4
Researches on role-based middleware in wireless sensor networks
Published 2011-01-01Subjects: Get full text
Article -
5
State-of-the-art survey of smart contract verification based on formal methods
Published 2022-08-01Subjects: Get full text
Article -
6
Theoretical problems of component-based structural synthesis
Published 2005-12-01Subjects: Get full text
Article -
7
Research on Web service discovery based on user community relations
Published 2015-10-01Subjects: Get full text
Article -
8
Research on formal description and verification of automated trust negotiation
Published 2011-01-01Subjects: Get full text
Article -
9
Improvement and formal proof on protocol Otway-Rees
Published 2012-09-01Subjects: Get full text
Article