共 50 条
- [2] Authenticity by typing for security protocols 14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, : 145 - 159
- [5] Differential Privacy by Typing in Security Protocols 2013 IEEE 26TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2013, : 272 - 286
- [6] Compositionality and Generalization in Emergent Languages 58TH ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS (ACL 2020), 2020, : 4427 - 4442
- [7] Formalizing and Proving a Typing Result for Security Protocols in Isabelle/HOL 2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 451 - 463
- [8] Generalization of the selective-ID security model for HIBE protocols PUBLIC KEY CRYPTOGRAPHY - PKC 2006, PROCEEDINGS, 2006, 3958 : 241 - 256
- [9] Generalization of the Selective-ID security model for HIBS Protocols COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 894 - +
- [10] Generalization of the selective-ID security model for HIBS protocols 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1583 - 1586