Citation to this article as recorded by
Huang, W. and B. Meng, 2011. Automated proof of resistance of denial of service attacks in remote internet voting protocol with extended applied Pi calculus. Inform. Technol. J., 10: 1468-1483. CrossRef |
Meng, B., 2011. A survey on analysis of selected cryptographic primitives and security protocols in symbolic model and computational model. Inform. Technol. J., 10: 1068-1091. CrossRefDirect Link |
Meng, B., 2011. Refinement of mechanized proof of security properties of remote internet voting protocol in applied PI calculus with proverif. Inform. Technol. J., 10: 293-334. CrossRefDirect Link |
Meng, B., 2012. Automatic formal framework of coercion-resistance in internet voting protocols with CryptoVerif in computational model. Inform. Technol. J., 11: 741-750. CrossRefDirect Link |
Citation to this article as recorded by
A Survey on Analysis of Selected Cryptographic Primitives and Security Protocols in Symbolic Model and Computational Model Information Technology Journal Vol. 10, Issue 6, 1068, 2011 |
Automated Proof of Resistance of Denial of Service Attacks in Remote Internet Voting Protocol with Extended Applied Pi Calculus Information Technology Journal Vol. 10, Issue 8, 1468, 2011 |
Refinement of mechanized proof of security properties of remote internet voting protocol in applied PI calculus with proverif. Information Technology Journal Vol. 10, Issue 2, 293, 2011 |
State Based Static and Dynamic Formal Analysis of UML State
Diagrams Journal of Software Engineering and Applications Vol. 05, Issue 07, 483, 2012 |
How to cite this article
Bo Meng, Wei Huang and Jun Qin, 2010. Automatic Verification of Security Properties of Remote Internet Voting Protocol in Symbolic Model. Information Technology Journal, 9: 1521-1556.
DOI: 10.3923/itj.2010.1521.1556
URL: https://scialert.net/abstract/?doi=itj.2010.1521.1556
DOI: 10.3923/itj.2010.1521.1556
URL: https://scialert.net/abstract/?doi=itj.2010.1521.1556