共 50 条
- [1] Incentives in Security Protocols (Transcript of Discussion) [J]. SECURITY PROTOCOLS XXVI, 2018, 11286 : 142 - 149
- [2] Remodelling the attacker in voting protocols (transcript of discussion) [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, 6615 LNCS : 235 - 240
- [3] Remodelling the Attacker in Voting Protocols (Transcript of Discussion) [J]. SECURITY PROTOCOLS XVI, 2011, 6615 : 235 - 240
- [4] Assuring the Safety of Asymmetric Social Protocols (Transcript of Discussion) [J]. SECURITY PROTOCOLS XXV, 2017, 10476 : 49 - 59
- [5] The initial costs and maintenance costs of protocols (transcript of discussion) [J]. SECURITY PROTOCOLS, 2007, 4631 : 336 - +
- [6] SMAPs: Short Message Authentication Protocols (Transcript of Discussion) [J]. SECURITY PROTOCOLS XXIV, 2017, 10368 : 133 - 140
- [7] Multiple Objectives of Lawful-Surveillance Protocols (Transcript of Discussion) [J]. SECURITY PROTOCOLS XXV, 2017, 10476 : 9 - 17
- [8] Redesigning Secure Protocols to Compel Security Checks (Transcript of Discussion) [J]. SECURITY PROTOCOLS XXIII, 2015, 9379 : 30 - 40
- [9] Protocols using keys from faulty data - (Transcript of discussion) [J]. SECURITY PROTOCOLS, 2002, 2467 : 180 - 187
- [10] TPM-Performance Sensible Key Management Protocols for Service Provisioning in Cloud Computing (Transcript of Discussion) [J]. SECURITY PROTOCOLS XVI, 2011, 6615 : 115 - 117