Author:
Chen Ming,Wu Kaigui,Xu Jie,He Pan
Publisher
Springer Berlin Heidelberg
Reference22 articles.
1. Kailar, R.: Accountability in electronic commerce protocols. IEEE Transactions on Software Engineering 5, 313–328 (1996)
2. Zhou, J., Gollmann, D.: Towards verification of non-repudiation protocols. In: International Refinement Workshop and Formal Methods Pacific, Canberra, Australia, pp. 370–380. Springer, Heidelberg (1998)
3. Shmatikov, V., Mitchell, J.C.: Finite-state analysis of two contract signing protocols. Theoretical Computer Science 2, 419–450 (2002)
4. Kremer, S., Raskin, J.: A game-based verification of non-repudiation and fair exchange protocols. Journal of Computer Security 3, 399–429 (2003)
5. Cederquist, J., Torabi Dashti, M.: An intruder model for verifying termination in security protocols. Technical Report 05-29, CTIT, University of Twente, Enschede, The Netherlands (2005)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献