Author:
Dechesne Francien,Wang Yanjing
Publisher
Springer Science and Business Media LLC
Subject
General Social Sciences,Philosophy
Reference107 articles.
1. Abadi, M., & Cortier, V. (2004). Deciding knowledge in security protocols under equational theories. In ICALP04, LNCS (Vol. 3142, pp. 46–58).
2. Abadi, M., & Fournet, C. (2001). Mobile values, new names, and secure communication. In POPL ’01 (pp. 104–115).
3. Abadi M., Rogaway P. (2002) Reconciling two views of cryptography (The computational soundness of formal encryption). Journal of Cryptology 15(2): 103–127
4. Abadi, M., & Tuttle, M. R. (1991). A semantics for a logic of authentication (extended abstract). In PODC ’91 (pp. 201–216). New York, NY, USA.
5. Accorsi, R., Basin, D., & Vigano, L. (2001). Towards an awareness-based semantics for security protocol analysis. In Logical aspects of cryptographic protocol verification, ENTCS (Vol. 55, pp. 5–24).
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献