Author:
Bracciali Andrea,Ferrari Gianluigi,Tuosto Emilio
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference65 articles.
1. Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: POPL ’01. Proceedings of the 28th ACM SIGPLAN-SIGACT on Principles of Programming Languages, ACM SIGPLAN Notices. ACM Press (2001)
2. Abadi M. and Gordon A. (1999). A calculus for cryptographic protocols: the Spi calculus. Inform. Comput. 148(1): 1–70
3. Amadio R. and Lugiez D. (2000). On the reachability problem in cryptographic protocols. In: Palamidessi, C (eds) International Conference in Concurrency Theory. Lecture Notes in Computer Science, vol. 1877, pp 380–394. Springer, Heidelberg
4. Amadio R., Lugiez D. and Vanackère V. (2003). On the symbolic reduction of processes with cryptographic functions. Theor. Comput. Sci. 290(1): 695–740
5. Amadio R. and Prasad S. (1999). The game of the name in cryptographic tables. In: Thiagarajan, P.S. and Yap, R. (eds) Advances in Computing Science—ASIAN’99. Lecture Notes in Computer Science vol. 1742., pp 15–26. Springer, Heidelberg
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Challenge-Response Attack on a Key Transport Protocol based on a Ring Locking Technique;2012 International Conference on Industrial Control and Electronics Engineering;2012-08
2. Heuristic Methods for Security Protocols;Electronic Proceedings in Theoretical Computer Science;2009-10-23
3. Authenticated Key Transport Protocol Based on a Locking-Signing Technique;2009 International Forum on Computer Science-Technology and Applications;2009