Author:
Yang Fan,Escobar Santiago,Meadows Catherine,Meseguer José
Publisher
Springer International Publishing
Reference15 articles.
1. Andova, S., Cremers, C.J.F., Gjøsteen, K., Mauw, S., Mjølsnes, S.F., Radomirovic, S.: A framework for compositional verification of security protocols. Inf. Comput. 206(2–4), 425–459 (2008)
2. Lecture Notes in Computer Science;M Arapinis,2015
3. Cheval, V., Cortier, V., le Morvan, E.: Secure refinements of communication channels. In: 35th IARCS Annual Conference on Foundation of Software Technology and Theoretical Computer Science, FSTTCS 2015, India (2015)
4. Cheval, V., Cortier, V., Warinschi, B.: Secure composition of PKIs with public key protocols. In: CSF 2017. Santa Barbara, USA, pp. 144–158 (2017)
5. Chevalier, C., Delaune, S., Kremer, S., Ryan, M.D.: Composition of password-based protocols. Form. Methods Syst. Des. 43(3), 369–413 (2013)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献