共 50 条
- [1] Remodelling the Attacker in Voting Protocols (Transcript of Discussion) SECURITY PROTOCOLS XVI, 2011, 6615 : 235 - 240
- [2] Remodelling the attacker in voting protocols (transcript of discussion) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, 6615 LNCS : 235 - 240
- [4] Validating Security Protocols under the General Attacker FOUNDATIONS AND APPLICATIONS OF SECURITY ANALYSIS, 2009, 5511 : 34 - +
- [8] Modelling Attacker's Knowledge for Cascade Cryptographic Protocols ABSTRACT STATE MACHINES, B AND Z, PROCEEDINGS, 2008, 5238 : 251 - 264