Citation to this article as recorded by
Chen, J.B., 2012. Implementation and evaluation of the live-CD based authentication gateway. Inform. Technol. J., 11: 1327-1331. CrossRefDirect Link |
Meng, B., 2011. A survey on analysis of selected cryptographic primitives and security protocols in symbolic model and computational model. Inform. Technol. J., 10: 1068-1091. CrossRefDirect Link |
Citation to this article as recorded by
A Survey on Analysis of Selected Cryptographic Primitives and Security Protocols in Symbolic Model and Computational Model Information Technology Journal Vol. 10, Issue 6, 1068, 2011 |
How to cite this article
Bo Meng , 2011. Automatic Verification of Deniable Authentication Protocol in a Probabilistic Polynomial Calculus with Cryptoverif. Information Technology Journal, 10: 717-735.
DOI: 10.3923/itj.2011.717.735
URL: https://scialert.net/abstract/?doi=itj.2011.717.735
DOI: 10.3923/itj.2011.717.735
URL: https://scialert.net/abstract/?doi=itj.2011.717.735