共 50 条
- [1] Safely composing security protocols [J]. FSTTCS 2007: FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE, PROCEEDINGS, 2007, 4855 : 352 - 363
- [3] Safely composing security protocols [J]. FORMAL METHODS IN SYSTEM DESIGN, 2009, 34 (01) : 1 - 36
- [4] Composing Quantum Protocols in a Classical Environment [J]. THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 350 - 367
- [5] Composing security protocols: From confidentiality to privacy [J]. Lect. Notes Comput. Sci., (324-343):
- [7] Positron: Composing Commitment-Based Protocols [J]. SERVICE-ORIENTED COMPUTING, (ICSOC 2015), 2015, 9435 : 19 - 35
- [8] Composing and Verifying Commitment-Based Multiagent Protocols [J]. PROCEEDINGS OF THE TWENTY-FOURTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI), 2015, : 10 - 17
- [10] LAYSTREAM: composing standard gossip protocols for live video streaming [J]. 14-TH IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P), 2014,