Citation to this article as recorded by
Huang, W. and B. Meng, 2011. Automated proof of resistance of denial of service attacks in remote internet voting protocol with extended applied Pi calculus. Inform. Technol. J., 10: 1468-1483. CrossRef |
Meng, B., 2011. A survey on analysis of selected cryptographic primitives and security protocols in symbolic model and computational model. Inform. Technol. J., 10: 1068-1091. CrossRefDirect Link |
Meng, B., 2012. Automatic formal framework of coercion-resistance in internet voting protocols with CryptoVerif in computational model. Inform. Technol. J., 11: 741-750. CrossRefDirect Link |
Citation to this article as recorded by
A Survey on Analysis of Selected Cryptographic Primitives and Security Protocols in Symbolic Model and Computational Model Information Technology Journal Vol. 10, Issue 6, 1068, 2011 |
Automated Proof of Resistance of Denial of Service Attacks in Remote Internet Voting Protocol with Extended Applied Pi Calculus Information Technology Journal Vol. 10, Issue 8, 1468, 2011 |
How to cite this article
Bo Meng , 2011. Refinement of Mechanized Proof of Security Properties of Remote Internet Voting Protocol in Applied PI Calculus with Proverif. Information Technology Journal, 10: 293-334.
DOI: 10.3923/itj.2011.293.334
URL: https://scialert.net/abstract/?doi=itj.2011.293.334
DOI: 10.3923/itj.2011.293.334
URL: https://scialert.net/abstract/?doi=itj.2011.293.334