Author:
Wu Fu-Sheng,Zhang Huan-Guo
Reference26 articles.
1. Zhang, H.G., Han, W.B., Lai, X.J., et al.: Survey on cyberspace security. Sci. China Inf. Sci. 58(11), 1–43 (2015)
2. Zheng, H., Qin, J., Jiankun, H., Qianhong, W.: Threshold attribute-based signcryption and its application to authenticated key agreement. Secur. Commun. Netw. 9, 4914–4923 (2016)
3. Zhao, S., Xi, L., Zhang, Q., Qin, Y., Feng, D.: Security analysis of SM2 key exchange protocol in TPM2.0. Secur. Commun. Netw. 8, 383–395 (2015)
4. Abadi, M., Blanchet, B.: Computer-assisted verification of a protocol for certified email. Sci. Comput. Progr. 58(1–2), 3–27 (2005)
5. Blanchet, B.: A computationally sound mechanized prover for security protocols. In IEEE Symposium on Security and Privacy, Oakland, California, pp. 140–154, May 2006