Author:
Blanchet B.,Abadi M.,Fournet C.
Cited by
32 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. How to Formalize Loop Iterations in Cryptographic Protocols Using ProVerif;IEEE Access;2024
2. Automated verification tools for cryptographic protocols;2021 International Conference on Promising Electronic Technologies (ICPET);2021-11
3. The DEEPSEC Prover;Computer Aided Verification;2018
4. Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System;Information and Communications Security;2018
5. Automated Analysis of Secure Internet of Things Protocols;Proceedings of the 33rd Annual Computer Security Applications Conference;2017-12-04