共 50 条
- [1] Incentive-driven attacker for corrupting two-party protocols Soft Computing, 2018, 22 : 7733 - 7740
- [3] Communication complexity in algebraic two-party protocols ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 379 - +
- [4] Adversarial Level Agreements for Two-Party Protocols ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 816 - 830
- [5] Certificateless authenticated two-party key agreement Protocols ADVANCES IN COMPUTER SCIENCE - ASIAN 2006: SECURE SOFTWARE AND RELATED ISSUES, 2007, 4435 : 37 - 44
- [6] An approach to the formal verification of the two-party cryptographic protocols Oper Syst Rev ACM, 4 (48-51):
- [7] Secure Equality Testing Protocols in the Two-Party Setting 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
- [8] Service-based synthesis of two-party protocols Elektrotehniski Vestnik/Electrotechnical Review, 2000, 67 (3-4): : 161 - 168