Publisher
Springer Berlin Heidelberg
Reference13 articles.
1. Blanchet, B.: An efficient cryptographic protocol verifier based on Prolog rules. In: Proc. 14th IEEE Computer Security Foundations Workshop (CSFW), pp. 82–96. IEEE, Los Alamitos (2001)
2. Lecture Notes in Computer Science;A. Armando,2005
3. Cremers, C.: Feasibility of multi-protocol attacks. In: Proc. of The 1st Int. Conf. on Availability, Reliability and Security (ARES), pp. 287–294. IEEE, Los Alamitos (2006)
4. Lecture Notes in Computer Science;C. Cremers,2005
5. Song, D.: An Automatic Approach for Building Secure Systems. PhD thesis, UC Berkeley (December 2003)
Cited by
273 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献