• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Information Technology Journal
  2. Vol 10 (3), 2011
  3. 611-625
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Information Technology Journal

Year: 2011 | Volume: 10 | Issue: 3 | Page No.: 611-625
DOI: 10.3923/itj.2011.611.625

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Article Trend



Total views 295

Authors


Bo Meng

Country: China

Fei Shao

Country: China

Keywords


  • Computational model
  • automatic framework
  • strong deniability
  • weak deniability
  • deniable authentication protocol
Research Article

Computationally Sound Mechanized Proofs for Deniable Authentication Protocols with a Probabilistic Polynomial Calculus in Computational Model

Bo Meng and Fei Shao
PDF Abstract Fulltext XML References

Citations in impact factor journals

Impact of Data Privacy and Confidentiality on Developing Telemedicine Applications: A Review Participates Opinion and Expert Concerns
International Journal of Pharmacology Vol. 7, Issue 3, 382, 2011

Citation to this article as recorded by ASCI logo

Meng, B., 2011. A survey on analysis of selected cryptographic primitives and security protocols in symbolic model and computational model. Inform. Technol. J., 10: 1068-1091.
CrossRefDirect Link

Meng, B., 2011. Automatic verification of deniable authentication protocol in a probabilistic polynomial calculus with cryptoverif. Inform. Technol. J., 10: 717-735.
CrossRefDirect Link

Xu, X., L. Niu and B. Meng, 2013. Automatic verification of security properties of OAuth 2.0 protocol with cryptoverif in computational model. Inform. Technol. J., 12: 2273-2285.
CrossRefDirect Link

Zaidan, B.B., A.A. Zaidan and M.L.M. Kiah, 2011. Impact of data privacy and confidentiality on developing telemedicine applications: A review participates opinion and expert concerns. Int. J. Pharmacol., 7: 382-387.
CrossRefDirect Link

Citation to this article as recorded by Crossref logo

A Survey on Analysis of Selected Cryptographic Primitives and Security Protocols in Symbolic Model and Computational Model
Information Technology Journal Vol. 10, Issue 6, 1068, 2011
Automatic Verification of Deniable Authentication Protocol in a Probabilistic Polynomial Calculus with Cryptoverif
Information Technology Journal Vol. 10, Issue 4, 717, 2011

How to cite this article

Bo Meng and Fei Shao, 2011. Computationally Sound Mechanized Proofs for Deniable Authentication Protocols with a Probabilistic Polynomial Calculus in Computational Model. Information Technology Journal, 10: 611-625.

DOI: 10.3923/itj.2011.611.625

URL: https://scialert.net/abstract/?doi=itj.2011.611.625

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved