Author:
Cheval Vincent,Cortier Véronique
Publisher
Springer Berlin Heidelberg
Reference37 articles.
1. http://nacl.cr.yp.to/
2. Machine readable travel document. Technical Report 9303, International Civil Aviation Organization (2008)
3. Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theoretical Computer Science 387(1-2), 2–32 (2006)
4. Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: 28th ACM Symp. on Principles of Programming Languages, POPL 2001 (2001)
5. Abadi, M., Gordon, A.: A calculus for cryptographic protocols: The spi calculus. In: 4th Conference on Computer and Communications Security (CCS 1997), pp. 36–47. ACM Press (1997)
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Biometric cryptosystems: a comprehensive survey;Multimedia Tools and Applications;2022-09-30
2. Resource and timing aspects of security protocols;Journal of Computer Security;2021-05-07
3. Resource-Bounded Intruders in Denial of Service Attacks;2019 IEEE 32nd Computer Security Foundations Symposium (CSF);2019-06
4. Symbolic Timed Trace Equivalence;Foundations of Security, Protocols, and Equational Reasoning;2019
5. A Multiset Rewriting Model for Specifying and Verifying Timing Aspects of Security Protocols;Foundations of Security, Protocols, and Equational Reasoning;2019