Publisher
Springer International Publishing
Reference30 articles.
1. Basin, D., Mödersheim, S., Viganò, L.: Constraint differentiation: a new reduction technique for constraint-based analysis of security protocols. In: CCS 2003, pp. 335–344. ACM Press, New York (2003)
2. Blanchet, B.: Modeling and verifying security protocols with the applied pi calculus and proverif. In: Foundations and Trends in Privacy and Security, pp. 1 (1–2):1–135 (October 2016)
3. Cervesato, I., Durgin, N.A., Mitchell, J.C., Lincoln, P., Scedrov, A.: Relating strands and multiset rewriting for security protocol analysis. In: Proceedings of the 13th IEEE Computer Security Foundations Workshop, CSFW 2000, Cambridge, England, UK, July 3–5, 2000. pp. 35–51. IEEE Computer Society (2000). https://doi.org/10.1109/CSFW.2000.856924
4. Corin, R., Malladi, S., Alves-Foss, J., Etalle, S.: Guess what? Here is a new tool that finds some new guessing attacks. In: Workshop in the Issues of Theory of Security (WITS03), Poland, Warsaw (April 2003)
5. Lecture Notes in Computer Science;R Corin,2002
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献