Cited By
View all- Basin DCremers C(2014)Know Your EnemyACM Transactions on Information and System Security10.1145/265899617:2(1-31)Online publication date: 17-Nov-2014
- Aizatulin MGordon AJürjens JYu TDanezis GGligor V(2012)Computational verification of C protocol implementations by symbolic executionProceedings of the 2012 ACM conference on Computer and communications security10.1145/2382196.2382271(712-723)Online publication date: 16-Oct-2012
- Xiao YSu K(2012)The DH exponentiation extension in a verification logic of local sessions2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE)10.1109/CSAE.2012.6272646(499-503)Online publication date: May-2012
- Show More Cited By