Author:
Bella Giampaolo,Longo Cristiano,Paulson Lawrence C
Publisher
Springer Berlin Heidelberg
Reference18 articles.
1. Lecture Notes in Computer Science;M. Abadi,2003
2. Abadi, M., Glew, N., Horne, B., Pinkas, B.: Certified email with a light on-line trusted third party: Design and implementation. In: Proceedings of the 11th International Conference on Wold Wide Web (WWW 2002). ACM Press and Addison Wesley (2002)
3. Asokan, N., Shoup, V., Waidner, M.: Asynchronous protocols for optimistic fair exchange. In: Proc. of the 17th IEEE Sym. on Sec. and Privacy. IEEE Comp. Society Press, Los Alamitos (1998)
4. Lecture Notes in Computer Science;T. Aura,1999
5. Bella, G.: Inductive verification of smart card protocols. J. of Comp. Sec. 11(1), 87–132 (2003)
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Refining security protocols;Journal of Computer Security;2017-11-30
2. Verifying layered security protocols;Journal of Computer Security;2015-07-02
3. Cryptographic Protocols;Modern Cryptography Primer;2013
4. Analysing Applications Layered on Unilaterally Authenticating Protocols;Lecture Notes in Computer Science;2012
5. Understanding Abstractions of Secure Channels;Lecture Notes in Computer Science;2011