共 50 条
- [22] Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols Journal of Cryptology, 2021, 34
- [23] How to secure network application systems using cryptographic protocols - Electronic voting systems case NEC RESEARCH & DEVELOPMENT, 2002, 43 (03): : 191 - 194
- [24] How to secure network application systems using cryptographic protocols - Electronic voting systems case NEC Research and Development, 2002, 43 (03): : 191 - 194
- [27] A bisimulation method for cryptographic protocols PROGRAMMING LANGUAGES AND SYSTEMS, 1998, 1381 : 12 - 26
- [29] Composition of secure multi-party protocols - A comprehensive study COMPOSITION OF SECURE MULTI-PARTY PROTOCOLS: A COMPREHENSIVE STUDY, 2003, 2815 : VII - +
- [30] Searching for shapes in cryptographic protocols TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PROCEEDINGS, 2007, 4424 : 523 - 537