|
Bo Meng, Leyuan Niu, Yitong Yang, Zimao Li 2014. Mechanized Verification of Security Properties of Transport Layer Security 1.2 Protocol with Crypto Verif in Computational Model Inform. Technol. J., 13: 601-613. CrossRef |
Huang, W. and B. Meng, 2011. Automated proof of resistance of denial of service attacks in remote internet voting protocol with extended applied Pi calculus. Inform. Technol. J., 10: 1468-1483. CrossRef |
Jaberi, A., R. Ayanzadeh and A.S.Z. Mousavi, 2012. Two-layer cellular automata based cryptography. Trends Applied Sci. Res., 7: 68-77. CrossRef | Direct Link |
Tao, F., W. Shuang and Y. Zhan-Ting, 2012. UC secure network coding against pollution attacks. Inform. Technol. J., 11: 1175-1183. CrossRef | Direct Link |
Xu, X., L. Niu and B. Meng, 2013. Automatic verification of security properties of OAuth 2.0 protocol with cryptoverif in computational model. Inform. Technol. J., 12: 2273-2285. CrossRef | Direct Link |
|
|
Citation to this article as recorded by
|
|
|
|