Identifying Dependency Between Secure Messages for Protocol Analysis
暂无分享,去创建一个
[1] Catherine A. Meadows,et al. Formal methods for cryptographic protocol analysis: emerging issues and trends , 2003, IEEE J. Sel. Areas Commun..
[2] Martín Abadi,et al. Secrecy by typing in security protocols , 1999, JACM.
[3] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[4] Shichao Zhang,et al. Detecting Collusion Attacks in Security Protocols , 2006, APWeb.
[5] A. Murat Tekalp,et al. Collusion-resilient fingerprinting using random prewarping , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[6] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[7] Yanchun Zhang,et al. Frontiers of WWW Research and Development - APWeb 2006, 8th Asia-Pacific Web Conference, Harbin, China, January 16-18, 2006, Proceedings , 2006, APWeb.
[8] Richard E. Neapolitan,et al. Learning Bayesian networks , 2007, KDD '07.