Cited By
View all- Zhang ZZhu LLiao LWang M(2012)Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairingsInformation Sciences: an International Journal10.1016/j.ins.2012.04.029209(93-112)Online publication date: 1-Nov-2012
- Cortier VKremer SWarinschi B(2011)A Survey of Symbolic Methods in Computational Analysis of Cryptographic SystemsJournal of Automated Reasoning10.1007/s10817-010-9187-946:3-4(225-259)Online publication date: 1-Apr-2011
- Roy ADatta ADerek AMitchell J(2010)Inductive trace properties for computational securityJournal of Computer Security10.5555/1891823.189182618:6(1035-1073)Online publication date: 21-Sep-2010
- Show More Cited By