Author:
Veeningen Meilof,de Weger Benne,Zannone Nicola
Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. Lecture Notes in Computer Science;A. Alcaide,2011
2. Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8, 18–36 (1990)
3. Claerhout, B., DeMoor, G.J.E.: Privacy protection for clinical and genomic data: The use of privacy-enhancing techniques in medicine. IJMI 74(2-4), 257–265 (2005)
4. Lecture Notes in Computer Science;M. Dahl,2012
5. Delaune, S., Kremer, S., Ryan, M.: Verifying privacy-type properties of electronic voting protocols. Comput. Secur. 17(4), 435–487 (2009)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献