Author:
Zunino Roberto,Degano Pierpaolo
Subject
General Computer Science,Theoretical Computer Science
Reference26 articles.
1. Secrecy by typing in security protocols;Abadi;J. ACM,1999
2. A calculus for cryptographic protocols: the Spi calculus;Abadi;J. Inform. Comput.,1999
3. M. Abadi, J. Jürjens, Formal eavesdropping and its computational interpretation, in: Proc. TACS 2001, Lecture Notes in Computer Science, Vol. 2215, 2001, p. 82.
4. M. Abadi, P. Rogaway, Reconciling two views of cryptography (the computational soundness of formal encryption), in: Proc. IFIP TCS2000, Lecture Notes in Computer Science, Vol. 1872, 2000, pp. 3–22.
5. M. Backes, C. Jacobi. Cryptographically sound and machine-assisted verification of security protocols, in: Proc. 20th Internat. Symp. on Theoretical Aspects of Computer Science, STACS ’03, 2003, pp. 675–686.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献