共 50 条
- [1] Securing wireless sensor networks with novel hybrid lightweight cryptographic protocols [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2B): : 703 - 714
- [2] Compiling and verifying security protocols [J]. LOGIC FOR PROGRAMMING AND AUTOMATED REASONING, PROCEEDINGS, 2000, 1955 : 131 - 160
- [3] Stateless Cryptographic Protocols [J]. 2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, : 678 - 687
- [7] Cryptographic Methods for Securing the YML Framework [J]. 2012 1ST INTERNATIONAL CONFERENCE ON SYSTEMS AND COMPUTER SCIENCE (ICSCS), 2012,
- [8] Securing Cryptographic Keys in the Cloud: A Survey [J]. IEEE CLOUD COMPUTING, 2016, 3 (04): : 42 - +
- [10] A bisimulation method for cryptographic protocols [J]. PROGRAMMING LANGUAGES AND SYSTEMS, 1998, 1381 : 12 - 26