Publisher
Springer Nature Switzerland
Reference24 articles.
1. Lecture Notes in Computer Science;S Blake-Wilson,1997
2. Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: Proceedings of IEEE CSFW-14, pp. 82–96 (2001)
3. Bruni, A., Jørgensen, T.S., Petersen, T.G., Schürmann, C.: Formal verification of ephemeral Diffie-Hellman over COSE (EDHOC). In: Proceedings of SSR, pp. 21–36 (2018)
4. Cohn-Gordon, K., Cremers, C., Garratt, L.: On post-compromise security. In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, 27 June - 1 July 2016. pp. 164–178. IEEE Computer Society (2016). https://doi.org/10.1109/CSF.2016.19
5. de Saint Guilhem, C.D., Fischlin, M., Warinschi, B.: Authentication in key-exchange: definitions, relations and composition. In: Proceedings of IEEE CSF, pp. 288–303 (2020). https://doi.org/10.1109/CSF49147.2020.00028