共 50 条
- [1] Soundness of digital signature in the presence of active adversaries [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 1352 - +
- [2] Soundness of formal encryption in the presence of active adversaries [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2004, 2951 : 133 - 151
- [3] Completing the picture:: Soundness of formal encryption in the presence of active adversaries [J]. PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2005, 3444 : 172 - 185
- [5] Identifying Adversaries' Signatures Using Knowledge Representations of Cyberattack Techniques on Cloud Infrastructure [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2022), 2022, : 333 - 339
- [6] Combating Adversaries with Anti-adversaries [J]. THIRTY-SIXTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FOURTH CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE / THE TWELVETH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2022, : 5992 - 6000
- [9] On simulatability soundness and mapping soundness of symbolic cryptography [J]. FSTTCS 2007: FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE, PROCEEDINGS, 2007, 4855 : 108 - +
- [10] Combining Adversaries with Anti-adversaries in Training [J]. THIRTY-SEVENTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 37 NO 9, 2023, : 11435 - 11442