Publisher
Springer Berlin Heidelberg
Reference90 articles.
1. Abadi, M. and Gordon, A.: A calculus for Cryptographic Protocols: the Spi Calculus, Information and Computation (1999)
2. Tech report;D. E. Bell,1976
3. Bellare, M. and Rogaway, P.: Entity Authentication and key Distribution, Advances in Cryptography-Proceedings of Crypto (1993) 55
4. Biba, K. J.: Integrity Considerations for Secure Computer Systems, US Airforce Electronic Systems Division (1977) 10
5. Brewer, D. F. C., Nash, M. J.: The Chinese Wall security policy, in Proceedings of the IEEE Symposium on Security and Privacy, (1989) 206–214 9
Cited by
37 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献