Author:
Datta Anupam,Derek Ante,Mitchell John C.,Pavlovic Dusko
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Proving Mutual Authentication Property of 5G-AKA Protocol Based on PCL;Communications in Computer and Information Science;2021
2. Sufficient conditions for vertical composition of security protocols;Proceedings of the 9th ACM symposium on Information, computer and communications security;2014-06-04
3. Protocol Derivation System for the Needham-Schroeder family;Security and Communication Networks;2012-06-25
4. Tracing the Man in the Middle in Monoidal Categories;Coalgebraic Methods in Computer Science;2012
5. Actor-Network Procedures;Distributed Computing and Internet Technology;2012