Author:
Dreier Jannik,Hirschi Lucca,Radomirovic Sasa,Sasse Ralf
Cited by
36 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Subterm-Based Proof Techniques for Improving the Automation and Scope of Security Protocol Analysis;2023 IEEE 36th Computer Security Foundations Symposium (CSF);2023-07
2. Proving Unlinkability Using ProVerif Through Desynchronised Bi-Processes;2023 IEEE 36th Computer Security Foundations Symposium (CSF);2023-07
3. Provable Non-Frameability for 5G Lawful Interception;Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks;2023-05-29
4. TLS Goes Low Cost: When TLS Meets Edge;Information Security Applications;2023
5. Extended Formal Analysis of the EDHOC Protocol in Tamarin;E-Business and Telecommunications;2023