共 50 条
- [32] Visualization of cryptographic protocols with GRACE JOURNAL OF VISUAL LANGUAGES AND COMPUTING, 2008, 19 (02): : 258 - 290
- [33] Collusion analysis of cryptographic protocols IEEE GLOBECOM 1996 - CONFERENCE RECORD, VOLS 1-3: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 1 - 5
- [35] Superposition Attacks on Cryptographic Protocols INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 142 - 161
- [36] Sequential Rationality in Cryptographic Protocols 2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2010, : 623 - 632
- [37] HIDDEN ASSUMPTIONS IN CRYPTOGRAPHIC PROTOCOLS IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1990, 137 (06): : 433 - 436
- [39] Transformations between Cryptographic Protocols FOUNDATIONS AND APPLICATIONS OF SECURITY ANALYSIS, 2009, 5511 : 107 - 123