Publisher
Springer International Publishing
Reference18 articles.
1. Lecture Notes in Computer Science;G Barthe,2014
2. Cervesato, I., Meadows, C., Pavlovic, D.: An encapsulated authentication logic for reasoning about key distribution protocols. In: Guttman, J. (ed.) Proceedings of CSFW 2005, pp. 48–61. IEEE (2005)
3. Daston, L.: How probabilities came to be objective and subjective. Hist. Math. 21(3), 330–344 (1994)
4. Datta, A., Derek, A., Mitchell, J., Pavlovic, D.: A derivation system and compositional logic for security protocols. J. Comput. Secur. 13, 423–482 (2005)
5. Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theor. 29(2), 198–208 (1983)