共 50 条
- [2] Safely composing security protocols [J]. FORMAL METHODS IN SYSTEM DESIGN, 2009, 34 (01) : 1 - 36
- [3] Composing security protocols: From confidentiality to privacy [J]. Lect. Notes Comput. Sci., (324-343):
- [5] Composing Protocols with Randomized Actions [J]. PRINCIPLES OF SECURITY AND TRUST (POST 2016), 2016, 9635 : 189 - 210
- [7] Composing Quantum Protocols in a Classical Environment [J]. THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 350 - 367
- [10] Positron: Composing Commitment-Based Protocols [J]. SERVICE-ORIENTED COMPUTING, (ICSOC 2015), 2015, 9435 : 19 - 35