SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.
Citation: | Rui Xue, Deng-Guo Feng. New Semantic Model for Authentication Protocols in ASMs[J]. Journal of Computer Science and Technology, 2004, 19(4). |
[1] | Chi Zhang, Jun-Rong Liu, Da-Wu Gu, Wei-Jia Wang, Xiang-Jun Lu, Zheng Guo, Hai-Ning Lu. Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks[J]. Journal of Computer Science and Technology, 2019, 34(5): 1079-1095. DOI: 10.1007/s11390-019-1961-5 |
[2] | Kai-Le Su, Qing-Liang Chen, Abdul Sattar, Wei-Ya Yue, Guan-Feng Lv, Xi-Zhong Zheng. Verification of Authentication Protocols for Epistemic Goals via SAT Compilation[J]. Journal of Computer Science and Technology, 2006, 21(6): 932-943. |
[3] | ZHAN Yongzhao, SONG Snunlin, XIE Li. Demand Priority Protocol Simulation and Evaluation[J]. Journal of Computer Science and Technology, 1999, 14(6): 599-605. |
[4] | XU Mingwei, WU Jianping. A Formal Approach to Protocol Performance Testing[J]. Journal of Computer Science and Technology, 1999, 14(1): 81-87. |
[5] | Hao Ruibing, Wu Jianping. A Formal Approach to Protocol Interoperability Testing[J]. Journal of Computer Science and Technology, 1998, 13(1): 79-90. |
[6] | Luo Junzhou, Gu Guanqun. CIMS Network Protocol and Its Net Models[J]. Journal of Computer Science and Technology, 1997, 12(5): 476-481. |
[7] | Wang Yun, Gu Guanqun, Dui Jiyin. Research on Protocol Migration[J]. Journal of Computer Science and Technology, 1996, 11(6): 601-606. |
[8] | Luo Gang. Generating Conformance Tests for Nondeterministic Protocol Machines[J]. Journal of Computer Science and Technology, 1994, 9(4): 289-301. |
[9] | Li Layuan. A New Formal Method for Communication Protocol Specification[J]. Journal of Computer Science and Technology, 1989, 4(1): 14-22. |
[10] | Feng Yulin. Hierarchical Protocol Analysis by Temporal Logic[J]. Journal of Computer Science and Technology, 1988, 3(1): 56-69. |