POSTER: TRIPLEX: verifying data minimisation in communication systems
暂无分享,去创建一个
[2] Nicola Zannone,et al. Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy , 2012, STM.
[3] Nicola Zannone,et al. A formal privacy analysis of identity management systems , 2012 .
[4] Jaap-Henk Hoepman,et al. Comparing Identity Management Frameworks in a Business Context , 2008, FIDIS.
[5] Catherine A. Meadows,et al. Formal methods for cryptographic protocol analysis: emerging issues and trends , 2003, IEEE J. Sel. Areas Commun..
[6] Diana Manole. Kiss , 2013 .
[7] Martín Abadi,et al. Automated verification of selected equivalences for security protocols , 2005, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05).
[8] Nicola Zannone,et al. Formal Privacy Analysis of Communication Protocols for Identity Management , 2011, ICISS.