共 50 条
- [2] Algebra model and security analysis for cryptographic protocols [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (02): : 199 - 220
- [3] A Performance Analysis Model for Cryptographic Protocols [J]. ICSIT 2011: THE 2ND INTERNATIONAL CONFERENCE ON SOCIETY AND INFORMATION TECHNOLOGIES, 2011, : 80 - 85
- [4] Provable security for cryptographic protocols - Exact analysis and engineering applications [J]. 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 45 - 58
- [5] Analysis of security requirements for cryptographic voting protocols (extended abstract) [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1451 - 1456
- [7] A survey on quantum cryptographic protocols and their security [J]. 2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 1121 - 1124
- [9] Security and Composition of Multiparty Cryptographic Protocols [J]. Journal of Cryptology, 2000, 13 : 143 - 202
- [10] METHODOLOGY FOR ASSESSING THE SECURITY OF CRYPTOGRAPHIC PROTOCOLS [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2022, (56): : 33 - 82