1. The applied pi calculus: mobile values, new names, and secure communication;Abadi;J. ACM (JACM),2017
2. PRIMES is in P;Agrawal;Ann. Math.,2004
3. Collective information security in large-scale urban protests: the case of Hong Kong;Albrecht,2021
4. Four attacks and a proof for Telegram;Albrecht;IEEE Symposium on Security and Privacy,2022
5. The Java SPI framework for security protocol implementation;Avalle,2011