共 50 条
- [1] Secure Electronic Coupons 2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 104 - 109
- [3] Secure interoperation of secure distributed databases - An architecture verification case study FM'99-FORMAL METHODS, 1999, 1708 : 701 - 717
- [4] Logical verification of secure electronic transactions protocol Ruan Jian Xue Bao/Journal of Software, 2000, 11 (03): : 346 - 362
- [5] Design and verification of a secure electronic auction protocol SEVENTEENTH IEEE SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 1998, : 204 - 210
- [7] A Trust Verification Architecture with Hardware Root for Secure Clouds IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2020, 5 (03): : 353 - 364
- [8] (B)LOCKBOX - Secure Software Architecture with Blockchain Verification 36TH ANNUAL EUROPEAN SIMULATION AND MODELLING CONFERENCE, ESM 2022, 2022, : 90 - 93
- [9] Adaptive secure software architecture for electronic commerce SOFTWARE-PRACTICE & EXPERIENCE, 2003, 33 (14): : 1343 - 1357
- [10] Using MTMs to Secure Electronic Signatures Generation 2012 9TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2012, : 315 - 318