Affiliation:
1. College of Electronic Science, National University of Defense Technology
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Artificial Intelligence,Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Hardware and Architecture,Software
Reference25 articles.
1. [1] C. Chen, L. Jia, H. Xu, C. Luo, W. Zhou, and B.T. Loo, “A Program Logic for Verifying Secure Routing Protocols,” Logical Methods in Computer Science, vol.11, no.4, 2015. 10.2168/LMCS-11(4:19)2015
2. [2] P. McCorry, S.F. Shahandashti, and F. Hao, “Refund attacks on Bitcoin's Payment Protocol,” Barbados: 20th Financial Cryptography and Data Security, vol.9603, pp.581-599, 2016. 10.1007/978-3-662-54970-4_34
3. [3] R. Küsters, T. Truderung, and A. Vogt, “Accountabiliy:Definition and Relationship to Verifiability,” The 17th ACM Conference on Computer and Communications Security, pp.526-535, 2010. 0.1145/1866307.1866366
4. [4] S. Qing, “A Formal Method for Analyzing Electronic Commerce Protocols,” J. Software, 2005. 10.1360/jos161757
5. [5] D. Zhou, S. Qing, and Z. Zhou, “A new approach for the analysis of electronic payment protocols,” J. Software, 2001.