共 50 条
- [41] Simulating Perceptions of Security (Transcript of Discussion) [J]. SECURITY PROTOCOLS XXV, 2017, 10476 : 69 - 75
- [42] Making Decryption Accountable (Transcript of Discussion) [J]. SECURITY PROTOCOLS XXV, 2017, 10476 : 99 - 108
- [43] How to Sync with Alice (Transcript of Discussion) [J]. SECURITY PROTOCOLS XIX, 2011, 7114 : 179 - 188
- [45] Self Attestation of Things (Transcript of Discussion) [J]. SECURITY PROTOCOLS XXV, 2017, 10476 : 85 - 92
- [46] The Dark Side of the Code (Transcript of Discussion) [J]. SECURITY PROTOCOLS XXIII, 2015, 9379 : 12 - 21
- [47] Modeling Partial Attacks with ALLOY (Transcript of Discussion) [J]. SECURITY PROTOCOLS, 2010, 5964 : 34 - 36
- [48] A proof of non-repudiation - (Transcript of discussion) [J]. SECURITY PROTOCOLS, 2002, 2467 : 126 - 133
- [49] One-Way Cryptography (Transcript of Discussion) [J]. SECURITY PROTOCOLS XIX, 2011, 7114 : 341 - 358
- [50] End to End Security is Not Enough (Transcript of Discussion) [J]. SECURITY PROTOCOLS XXV, 2017, 10476 : 268 - 277