|
Huang, W. and B. Meng, 2011. Automated proof of resistance of denial of service attacks in remote internet voting protocol with extended applied Pi calculus. Inform. Technol. J., 10: 1468-1483. CrossRef |
Meng, B., 2011. A survey on analysis of selected cryptographic primitives and security protocols in symbolic model and computational model. Inform. Technol. J., 10: 1068-1091. CrossRef | Direct Link |
Meng, B., 2011. Refinement of mechanized proof of security properties of remote internet voting protocol in applied PI calculus with proverif. Inform. Technol. J., 10: 293-334. CrossRef | Direct Link |
Meng, B., 2012. Automatic formal framework of coercion-resistance in internet voting protocols with CryptoVerif in computational model. Inform. Technol. J., 11: 741-750. CrossRef | Direct Link |
Meng, B., W. Huang and J. Qin, 2010. Automatic verification of security properties of remote internet voting protocol in symbolic model. Inform. Technol. J., 9: 1521-1556. CrossRef | Direct Link |
|
|
Citations in impact factor journal as recorded by
|
An Effective Approach to Long-Term Optimal Operation of Large-Scale Reservoir Systems: Case Study of the Three Gorges System |
Water Resources Management
|
|
Effective microbes for simultaneous bio-oxidation of ammonia and manganese in biological aerated filter system |
Bioresource Technology
|
|
Production of chitin from shrimp shell powders using Serratia marcescens B742 and Lactobacillus plantarum ATCC 8014 successive two-step fermentation |
Carbohydrate Research
|
|
|
|
Citation to this article as recorded by
|
A Generic Approach to Prevent Board Flooding Attacks in Coercion-Resistant Electronic Voting Schemes |
Computers & Security
|
|
|
|
|
|