Cited By
View all- Paiola MBlanchet B(2018)Verification of security protocols with listsJournal of Computer Security10.5555/2595044.259504621:6(781-816)Online publication date: 24-Dec-2018
- Choo K(2018)On the Security Analysis of Lee, Hwang & Lee (2004) and Song & Kim (2000) Key Exchange / Agreement ProtocolsInformatica10.5555/1413878.141387917:4(467-480)Online publication date: 17-Dec-2018
- Pereira OQuisquater J(2018)On the impossibility of building secure cliques-type authenticated group key agreement protocolsJournal of Computer Security10.5555/1150577.115058114:2(197-246)Online publication date: 24-Dec-2018
- Show More Cited By