Author:
Jiang Rui,Pan Li,Li Jian-Hua
Subject
Law,General Computer Science
Reference4 articles.
1. Efficient anonymous auction protocols with freewheeling bids;Chang;Computers & Security,2003
2. Security protocol design via authentication tests;Guttman,2002
3. Authentication tests and the structure of bundles;Guttman;Theoretical Computer Science,2002
4. Strand spaces: proving security protocols correct;Thayer Fabrega;Journal of Computer Security,1999
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献