Author:
Shao Jianxiong,Qin Yu,Feng Dengguo
Publisher
Springer Berlin Heidelberg
Reference26 articles.
1. Blanchet, B.: An efficient cryptographic protocol verifier based on Prolog rules. In: 2001 Proceedings of the 14th IEEE Computer Security Foundations Workshopp, pp. 82–96 (2001)
2. Lecture Notes in Computer Science;A Armando,2005
3. Lecture Notes in Computer Science;S Escobar,2009
4. Dolev, D., Yao, A.C.: On the security of public key protocols. In: Proceedings of the 22nd Annual Symposium on Foundations of Computer Science, SFCS 1981, pp. 350–357. IEEE Computer Society, Washington, DC (1981)
5. Even, S., Goldreich, O.: On the security of multi-party ping-pong protocols. In: 24th Annual Symposium on Foundations of Computer Science, pp. 34–39, November 1983
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Computational Soundness for Dalvik Bytecode;Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security;2016-10-24