Citations in impact factor journals
Impact of Data Privacy and Confidentiality on Developing Telemedicine Applications: A Review Participates Opinion and Expert Concerns International Journal of Pharmacology Vol. 7, Issue 3, 382, 2011 |
Citation to this article as recorded by
Meng, B., 2011. A survey on analysis of selected cryptographic primitives and security protocols in symbolic model and computational model. Inform. Technol. J., 10: 1068-1091. CrossRefDirect Link |
Meng, B., 2011. Automatic verification of deniable authentication protocol in a probabilistic polynomial calculus with cryptoverif. Inform. Technol. J., 10: 717-735. CrossRefDirect Link |
Xu, X., L. Niu and B. Meng, 2013. Automatic verification of security properties of OAuth 2.0 protocol with cryptoverif in computational model. Inform. Technol. J., 12: 2273-2285. CrossRefDirect Link |
Zaidan, B.B., A.A. Zaidan and M.L.M. Kiah, 2011. Impact of data privacy and confidentiality on developing telemedicine applications: A review participates opinion and expert concerns. Int. J. Pharmacol., 7: 382-387. CrossRefDirect Link |
Citation to this article as recorded by
A Survey on Analysis of Selected Cryptographic Primitives and Security Protocols in Symbolic Model and Computational Model Information Technology Journal Vol. 10, Issue 6, 1068, 2011 |
Automatic Verification of Deniable Authentication Protocol in a Probabilistic Polynomial Calculus with Cryptoverif Information Technology Journal Vol. 10, Issue 4, 717, 2011 |
How to cite this article
Bo Meng and Fei Shao, 2011. Computationally Sound Mechanized Proofs for Deniable Authentication Protocols with a Probabilistic Polynomial Calculus in Computational Model. Information Technology Journal, 10: 611-625.
DOI: 10.3923/itj.2011.611.625
URL: https://scialert.net/abstract/?doi=itj.2011.611.625
DOI: 10.3923/itj.2011.611.625
URL: https://scialert.net/abstract/?doi=itj.2011.611.625