共 50 条
- [3] Fingerprinting Cryptographic Protocols with Key Exchange using an Entropy Measure [J]. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 170 - 179
- [4] Computational Soundness for Key Exchange Protocols with Symmetric Encryption [J]. CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 91 - 100
- [6] Algebra model and security analysis for cryptographic protocols [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (02): : 199 - 220
- [7] Algebra model and security analysis for cryptographic protocols [J]. Science in China Series F: Information Sciences, 2004, 47 : 199 - 220
- [8] Types and effects for asymmetric cryptographic protocols [J]. 15TH IEEE COMPUTER SECURITY FOUNDATION WORKSHOP, PROCEEDINGS, 2002, : 77 - 91
- [9] Symmetric cryptographic protocols for extended millionaires' problem [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2009, 52 (06): : 974 - 982