Author:
Abadi Martín,Fournet Cédric
Cited by
212 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Automated Security Analysis for Real-World IoT Devices;Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy;2023-10-29
2. Hardware and Software Cyber Security Tools;AI Tools for Protecting and Preventing Sophisticated Cyber Attacks;2023-08-10
3. Symbolic modelling of remote attestation protocols for device and app integrity on Android;Proceedings of the ACM Asia Conference on Computer and Communications Security;2023-07-10
4. Election Verifiability with ProVerif;2023 IEEE 36th Computer Security Foundations Symposium (CSF);2023-07
5. Attribute-based encryption with enforceable obligations;Journal of Cryptographic Engineering;2023-04-29