Author:
Veeningen Meilof,de Weger Benne,Zannone Nicola
Publisher
Springer Berlin Heidelberg
Reference21 articles.
1. Lecture Notes in Computer Science;E. Bangerter,2006
2. Blanchet, B., Abadi, M., Fournet, C.: Automated Verification of Selected Equivalences for Security Protocols. J. Log. Algebr. Program. 75(1), 3–51 (2008)
3. Butin, D., Bella, G.: Verifying Privacy by Little Interaction and No Process Equivalence. In: Proceedings of SECRYPT 2012. INSTICC Press (2012) (in press)
4. Camenisch, J., Sommer, D., Zimmermann, R.: A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures. In: Proceedings of SEC 2006. Springer (2006)
5. Clarke, E.M., Jha, S., Marrero, W.R.: Using State Space Exploration and a Natural Deduction Style Message Derivation Engine to Verify Security Protocols. In: Proceedings of PROCOMET 1998. Chapman & Hall, Ltd. (1998)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Qualitative-Driven Study of Irreversible Data Anonymizing Techniques in Databases;Proceedings of the 13th International Conference on Intelligent Systems: Theories and Applications;2020-09-23
2. Active Linking Attacks;Mathematical Foundations of Computer Science 2015;2015
3. Data minimisation in communication protocols: a formal analysis framework and application to identity management;International Journal of Information Security;2014-04-12