共 50 条
- [1] Key agreement protocols and their security analysis (Extended abstract) [J]. CRYPTOGRAPHY AND CODING, PROCEEDINGS, 1997, 1355 : 30 - 45
- [2] Cryptographic protocols for electronic voting [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 393 - 393
- [4] Algebra model and security analysis for cryptographic protocols [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (02): : 199 - 220
- [5] Algebra model and security analysis for cryptographic protocols [J]. Science in China Series F: Information Sciences, 2004, 47 : 199 - 220
- [6] Cryptographic voting protocols: A systems perspective [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 14TH USENIX SECURITY SYMPOSIUM, 2005, : 33 - 49
- [8] Cryptographic Protocols Implementation Security Verification Of The Electronic Voting System Based On Blind Intermediaries [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN'19), 2019,
- [9] Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting [J]. PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 224 - 229
- [10] On security models and compilers for group key exchange protocols (Extended abstract) [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 292 - +