Author:
Teichel Kristof,Sibold Dieter,Milius Stefan
Publisher
Springer International Publishing
Reference32 articles.
1. Lecture Notes in Computer Science;M Abadi,2007
2. Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2001, pp. 104–115. ACM, New York (2001).
http://doi.acm.org/10.1145/360204.360213
3. Archer, M.: Proving correctness of the basic TESLA multicast stream authentication protocol with TAME. In: Workshop on Issues in the Theory of Security, pp. 14–15 (2002)
4. Basin, D., Capkun, S., Schaller, P., Schmidt, B.: Formal Reasoning About Physical Properties of Security Protocols. ACM Trans. Inf. Syst. Secur. 14(2), 16:1–16:28 (2011)
5. Lecture Notes in Computer Science;G Behrmann,2004
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Covert Channels in Network Time Security;Proceedings of the 2022 ACM Workshop on Information Hiding and Multimedia Security;2022-06-23