|
Meng, B., 2011. A survey on analysis of selected cryptographic primitives and security protocols in symbolic model and computational model. Inform. Technol. J., 10: 1068-1091. CrossRef | Direct Link |
Meng, B., 2011. Automatic verification of deniable authentication protocol in a probabilistic polynomial calculus with cryptoverif. Inform. Technol. J., 10: 717-735. CrossRef | Direct Link |
Xu, X., L. Niu and B. Meng, 2013. Automatic verification of security properties of OAuth 2.0 protocol with cryptoverif in computational model. Inform. Technol. J., 12: 2273-2285. CrossRef | Direct Link |
Zaidan, B.B., A.A. Zaidan and M.L.M. Kiah, 2011. Impact of data privacy and confidentiality on developing telemedicine applications: A review participates opinion and expert concerns. Int. J. Pharmacol., 7: 382-387. CrossRef | Direct Link |
|
|
Citations in impact factor journal as recorded by
|
|
Citation to this article as recorded by
|
|
|
|