Non-Malleability and Emulation Based Approach to Cryptographic Protocol Analysis: Non-Malleability and Emulation Based Approach to Cryptographic Protocol Analysis
暂无分享,去创建一个
[1] Catherine A. Meadows,et al. Formal methods for cryptographic protocol analysis: emerging issues and trends , 2003, IEEE J. Sel. Areas Commun..
[2] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).