Cited By
View all- Horne RMauw SYurkov S(2023)When privacy fails, a formula describes an attackTheoretical Computer Science10.1016/j.tcs.2023.113842959:COnline publication date: 30-May-2023
- Zhou QPandey OYe F(2022)An Approach for Multi-Level Visibility Scoping of IoT Services in Enterprise EnvironmentsIEEE Transactions on Mobile Computing10.1109/TMC.2020.301287521:2(408-420)Online publication date: 1-Feb-2022
- Mödersheim S(2022)Rewriting PrivacyRewriting Logic and Its Applications10.1007/978-3-031-12441-9_2(22-41)Online publication date: 2-Apr-2022
- Show More Cited By