共 50 条
- [1] Secure Composition of Cryptographic Protocols INFORMATION SYSTEMS SECURITY, 2011, 7093 : 71 - 71
- [2] Cryptographic Protocols for Secure Cloud Computing INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (02): : 301 - 310
- [3] Comparse: Provably Secure Formats for Cryptographic Protocols PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 564 - 578
- [6] Security and Composition of Multiparty Cryptographic Protocols Journal of Cryptology, 2000, 13 : 143 - 202
- [7] Security and composition of cryptographic protocols: A tutorial Canetti, R., 1600, IOS Press BV (10):
- [8] Cryptographic protocols for secure second-price auctions COOPERATIVE INFORMATION AGENTS V, PROCEEDINGS, 2001, 2182 : 154 - 165
- [9] Cryptographic Primitives for Building Secure and Privacy Respecting Protocols PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 361 - 361
- [10] Suitable Symbolic Models for Cryptographic Verification of Secure Protocols in ProVerif PROCEEDINGS OF 2018 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2018), 2018, : 326 - 330