Review Article
A Survey on Analysis of Selected Cryptographic Primitives and Security Protocols in Symbolic Model and Computational Model

Citation to this article as recorded by ASCI
Bo Meng, Leyuan Niu, Yitong Yang, Zimao Li 2014. Mechanized Verification of Security Properties of Transport Layer Security 1.2 Protocol with Crypto Verif in Computational Model Inform. Technol. J., 13: 601-613.
CrossRef  |  

Huang, W. and B. Meng, 2011. Automated proof of resistance of denial of service attacks in remote internet voting protocol with extended applied Pi calculus. Inform. Technol. J., 10: 1468-1483.
CrossRef  |  

Jaberi, A., R. Ayanzadeh and A.S.Z. Mousavi, 2012. Two-layer cellular automata based cryptography. Trends Applied Sci. Res., 7: 68-77.
CrossRef  |  Direct Link  |  

Tao, F., W. Shuang and Y. Zhan-Ting, 2012. UC secure network coding against pollution attacks. Inform. Technol. J., 11: 1175-1183.
CrossRef  |  Direct Link  |  

Xu, X., L. Niu and B. Meng, 2013. Automatic verification of security properties of OAuth 2.0 protocol with cryptoverif in computational model. Inform. Technol. J., 12: 2273-2285.
CrossRef  |  Direct Link  |  

Related Articles in ASCI
Similar Articles in this Journal
Search in Google Scholar
View Citation
Report Citation

©  2021 Science Alert. All Rights Reserved