Author:
Cortier Véronique,Warinschi Bogdan
Publisher
Springer Berlin Heidelberg
Reference22 articles.
1. Abadi, M.: Taming the adversary. In: Proc. of Crypto 2000 (2000)
2. Abadi, M., Gordon, A.: A calculus for cryptographic protocols: The spi calculus. In: Proc. of the 4th Conf. on Computer and Communications Security, pp. 36–47. ACM Press, New York (1997)
3. Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology 15(2), 103–127 (2002)
4. Backes, M.: Personal communication
5. Backes, M., Pfitzmann, B., Waidner, M.: A composable cryptographic library with nested operations (extended abstract). In: Proc. of 10th ACM Conference on Computer and Communications Security (CCS 2005), pp. 220–230 (2003)
Cited by
39 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献