共 50 条
- [22] Hardware Implementation of Ultralightweight Cryptographic Protocols 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS), 2015,
- [23] Resource-aware Authorization Policies for Statically Typed Cryptographic Protocols 2011 IEEE 24TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2011, : 83 - 98
- [24] Cryptographic Protocols Implementation Security Verification Of The Electronic Voting System Based On Blind Intermediaries PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN'19), 2019,
- [25] Automatic detection of attacks on cryptographic protocols: A case study DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, PROCEEDINGS, 2005, 3548 : 69 - 84
- [27] Algebra model and security analysis for cryptographic protocols SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (02): : 199 - 220
- [28] Studying Formal Security Proofs for Cryptographic Protocols INFORMATION SECURITY EDUCATION FOR A GLOBAL DIGITAL SOCIETY, WISE 10, 2017, 503 : 63 - 73
- [29] On different approaches to establish the security of cryptographic protocols SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 637 - 643