Author:
Fazouane Marouane,Kopp Henning,van der Heijden Rens W.,Le Métayer Daniel,Kargl Frank
Publisher
Springer International Publishing
Reference35 articles.
1. Lecture Notes in Computer Science;T. Antignac,2014
2. Backes, M., Dürmuth, M., Karjoth, G.: Unification in Privacy Policy Evaluation - Translating EPAL into Prolog. In: POLICY, pp. 185–188 (2004)
3. Barth, A., Mitchell, J.C., Datta, A., Sundaram, S.: Privacy and Utility in Business Processes. In: CSF, pp. 279–294 (2007)
4. Lecture Notes in Computer Science;M.Y. Becker,2010
5. Blanchet, B., Abadi, M., Fournet, C.: Automated verification of selected equivalences for security protocols. In: Proceedings of the 20th Annual IEEE Symposium on Logic in Computer Science, LICS 2005, pp. 331–340. IEEE (2005)
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Self-sovereign Identity for Electric Vehicle Charging;Lecture Notes in Computer Science;2024
2. Design of Multi-Layer Information Security Protection Scheme for Vehicle-to-Grid System;2023 3rd International Conference on Computer Science, Electronic Information Engineering and Intelligent Control Technology (CEI);2023-12-15
3. Formal Verification of a V2X Privacy Preserving Scheme Using Proverif;2023 IEEE International Conference on Cyber Security and Resilience (CSR);2023-07-31
4. A zero trust and blockchain-based defense model for smart electric vehicle chargers;Journal of Network and Computer Applications;2023-04
5. Introduction;Formal Analysis by Abstract Interpretation;2021-12-14