Review Article

Citations for "A Survey on Analysis of Selected Cryptographic Primitives and Security Protocols in Symbolic Model and Computational Model"


Citation to this article as recorded by ASCI logo


Bo Meng, Leyuan Niu, Yitong Yang, Zimao Li 2014. Mechanized Verification of Security Properties of Transport Layer Security 1.2 Protocol with Crypto Verif in Computational Model Inform. Technol. J., 13: 601-613.
CrossRef  |  

Huang, W. and B. Meng, 2011. Automated proof of resistance of denial of service attacks in remote internet voting protocol with extended applied Pi calculus. Inform. Technol. J., 10: 1468-1483.
CrossRef  |  

Jaberi, A., R. Ayanzadeh and A.S.Z. Mousavi, 2012. Two-layer cellular automata based cryptography. Trends Applied Sci. Res., 7: 68-77.
CrossRef  |  Direct Link  |  

Tao, F., W. Shuang and Y. Zhan-Ting, 2012. UC secure network coding against pollution attacks. Inform. Technol. J., 11: 1175-1183.
CrossRef  |  Direct Link  |  

Xu, X., L. Niu and B. Meng, 2013. Automatic verification of security properties of OAuth 2.0 protocol with cryptoverif in computational model. Inform. Technol. J., 12: 2273-2285.
CrossRef  |  Direct Link  |  


Citation to this article as recorded by Crossref logo


Automated Proof of Resistance of Denial of Service Attacks in Remote Internet Voting Protocol with Extended Applied Pi Calculus
Information Technology Journal Vol. 10, Issue 8, 1468, 2011

Two-layer Cellular Automata Based Cryptography
Trends in Applied Sciences Research Vol. 7, Issue 1, 68, 2012

Verification of Resistance of Denial of Service Attacks in Extended Applied Pi Calculus with ProVerif
Journal of Computers Vol. 7, Issue 4, , 2012

Services
Related Articles in ASCI
Search in Google Scholar
View Citation
Report Citation

 
©  2022 Science Alert. All Rights Reserved