共 50 条
- [31] Provable security for cryptographic protocols - Exact analysis and engineering applications 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 45 - 58
- [34] Analysis of security requirements for cryptographic voting protocols (extended abstract) ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1451 - 1456
- [35] Security and Network Performance Evaluation of KK' Cryptographic Technique in Mobile Adhoc Networks 2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1151 - 1156
- [38] Network Security and Networking Protocols RECENT TRENDS IN NETWORKS AND COMMUNICATIONS, 2010, 90 : 90 - 97
- [39] Security Mechanisms in Network Protocols UKSIM-AMSS FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS, MODELLING AND SIMULATION, 2010, : 427 - 430
- [40] Tracking Security Flaws in Cryptographic Protocols Using Witness-Functions 2015 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2015): BIG DATA ANALYTICS FOR HUMAN-CENTRIC SYSTEMS, 2015, : 1189 - 1196