Author:
Choo Kim-Kwang Raymond,Boyd Colin,Hitchcock Yvonne
Publisher
Springer Berlin Heidelberg
Cited by
75 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Computational Models to Prove Security Protocols Against Adversary;Proceedings of Fourth Doctoral Symposium on Computational Intelligence;2023
2. Security Access Assurance Related Technologies Survey;2022 European Conference on Communication Systems (ECCS);2022-05
3. Verifying MQV-Based Protocols Using ProVerif;Lecture Notes in Electrical Engineering;2021
4. Strongly Secure Identity-Based Key Exchange with Single Pairing Operation;IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences;2021-01-01
5. Strongly leakage resilient authenticated key exchange, revisited;Designs, Codes and Cryptography;2019-06-22