Research Article

Citations for "Formalizing Deniability"


Citation to this article as recorded by ASCI logo


Meng, B. and F. Shao, 2010. Computationally sound mechanized proofs for deniable authentication protocols with a probabilistic polynomial calculus in computational model. Inform. Technol. J., 10: 611-625.
CrossRef  |  Direct Link  |  

Meng, B., 2011. A survey on analysis of selected cryptographic primitives and security protocols in symbolic model and computational model. Inform. Technol. J., 10: 1068-1091.
CrossRef  |  Direct Link  |  

Meng, B., 2011. Automatic verification of deniable authentication protocol in a probabilistic polynomial calculus with cryptoverif. Inform. Technol. J., 10: 717-735.
CrossRef  |  Direct Link  |  

Zaidan, B.B., A.A. Zaidan and M.L.M. Kiah, 2011. Impact of data privacy and confidentiality on developing telemedicine applications: A review participates opinion and expert concerns. Int. J. Pharmacol., 7: 382-387.
CrossRef  |  Direct Link  |  


Citations in impact factor journal as recorded by Crossref logo


Impact of Data Privacy and Confidentiality on Developing Telemedicine Applications: A Review Participates Opinion and Expert Concerns
International Journal of Pharmacology Vol. 7, Issue 3, 382, 2011


Citation to this article as recorded by Crossref logo


A Survey on Analysis of Selected Cryptographic Primitives and Security Protocols in Symbolic Model and Computational Model
Information Technology Journal Vol. 10, Issue 6, 1068, 2011

Computationally Sound Mechanized Proofs for Deniable Authentication Protocols with a Probabilistic Polynomial Calculus in Computational Model
Information Technology Journal Vol. 10, Issue 3, 611, 2011

Automatic Verification of Deniable Authentication Protocol in a Probabilistic Polynomial Calculus with Cryptoverif
Information Technology Journal Vol. 10, Issue 4, 717, 2011

Services
Related Articles in ASCI
Search in Google Scholar
View Citation
Report Citation

 
©  2022 Science Alert. All Rights Reserved