Author:
Küsters Ralf,Wilke Thomas
Subject
Computational Theory and Mathematics,Computer Science Applications,Information Systems,Theoretical Computer Science
Reference39 articles.
1. XML with data values: typechecking revisited;Alon;Journal of Computer and System Sciences,2003
2. On the symbolic reduction of processes with cryptographic functions;Amadio;Theoretical Computer Science,2002
3. Authenticated group key agreement and friends;Ateniese,1998
4. M. Bellare, P. Rogaway, Provably secure session key distribution: the three party case, in: Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing (STOC’95), ACM, 1995, pp. 57–66.
5. Symbolic trace analysis of cryptographic protocols;Boreale,2001
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献