共 50 条
- [3] Algebra model and security analysis for cryptographic protocols [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (02): : 199 - 220
- [4] Design of cryptographic protocols by means of genetic algorithms techniques [J]. SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 316 - +
- [5] Algebra model and security analysis for cryptographic protocols [J]. Science in China Series F: Information Sciences, 2004, 47 : 199 - 220
- [6] PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC ALGORITHMS FOR CLOUD SECURITY [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 273 - 279
- [7] Provable security for cryptographic protocols - Exact analysis and engineering applications [J]. 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 45 - 58
- [8] Analysis of security requirements for cryptographic voting protocols (extended abstract) [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1451 - 1456
- [9] Predicting New Attacks: A Case Study in Security Analysis of Cryptographic Protocols [J]. ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING: FUTURETECH & MUE, 2016, 393 : 263 - 270