1. Research on semantics and algorithm of formal analysis tool Scyther;2022 IEEE 4th International Conference on Civil Aviation Safety and Information Technology (ICCASIT);2022-10-12
2. Vulnerability Analysis of CSP Based on Stochastic Game Theory;Journal of Control Science and Engineering;2016
3. Network Security and Metrology: A Survey;International Journal of Security and Its Applications;2015-11-30
4. A formal framework for security analysis of NFC mobile coupon protocols;Journal of Computer Security;2015-09-22
5. Analysis of two authorization protocols using Colored Petri Nets;International Journal of Information Security;2014-07-03