共 50 条
- [2] Provable Cryptographic Security and its Applications to Mobile Wireless Computing [J]. Wireless Personal Communications, 2004, 29 : 191 - 203
- [3] Domain Engineering for Automatic Analysis of Financial Applications of Cryptographic Protocols [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2010, 6052 : 428 - 428
- [4] Provable implementations of security protocols [J]. 21ST ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2006, : 345 - 346
- [6] Algebra model and security analysis for cryptographic protocols [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (02): : 199 - 220
- [7] Algebra model and security analysis for cryptographic protocols [J]. Science in China Series F: Information Sciences, 2004, 47 : 199 - 220
- [9] A Review on Cryptographic Techniques and Security Protocols over Instant Messaging Applications [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (08): : 93 - 97
- [10] Analysis of security requirements for cryptographic voting protocols (extended abstract) [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1451 - 1456