Author:
Bryans Jeremy W.,Koutny Maciej,Mazaré Laurent,Ryan Peter Y. A.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference34 articles.
1. Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. In: 31th International Colloquium on Automata, Languages and Programming (ICALP’04) (2004)
2. Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). In: IFIP International Conference on Theoretical Computer Science (IFIP TCS2000) (2000)
3. Badouel, E., Bednarczyk, M., Borzyszkowski, A., Caillaud, B., Darondeau, P.: Concurrent secrets. In: Lafortune, S., Lin, F., Tilbury, D. (eds.) 8th Workshop on Discrete Event Systems, WODES’06. Ann Arbor, July 2006 (2006)
4. Bieber, P.: A Logic of Communication in a Hostile Environment. In: Computer Security Foundations Workshop, June 1990, vol. 3, pp. 14–22. IEEE Computer Society Press, New York (1990)
5. Bryans, J.W., Koutny, M., Ryan, P.Y.A.: Modelling dynamic opacity using Petri nets with silent actions. In: Proceedings of IFIP TC1 WG1.7 Workshop on Formal Aspects of Security and Trust, pp. 159–172. Kluwer, Dordrecht (2004)
Cited by
159 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献