1. Lecture Notes in Computer Science;J-F Dhem,2000
2. Felten, E.W., Schneider, M.A.: Timing attacks on web privacy. In: Proceedings of the 7th ACM Conference on Computer and Communications Security, CCS 2000, pp. 25–32. ACM, New York (2000). https://doi.org/10.1145/352600.352606
3. Focardi, R., Gorrieri, R., Martinelli, F.: Information flow analysis in a discrete-time process algebra. In: Proceedings 13th IEEE Computer Security Foundations Workshop, CSFW 2013, pp. 170–184, July 2000
4. Garrido-Hidalgo, C., Hortelano, D., Roda-Sanchez, L., Olivares, T., Ruiz, M.C., Lopez, V.: IoT heterogeneous mesh network deployment for human-in-the-loop challenges towards a social and sustainable industry 4.0. IEEE Access PP, 1 (2018)
5. Goguen, J.A., Meseguer, J.: Security policies and security models. In: 1982 IEEE Symposium on Security and Privacy, p. 11, April 1982