共 59 条
[1]
[Anonymous], C THEOR APPL CRYPT
[4]
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol
[J].
PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17),
2017,
:800-814
[7]
Avoine G, 2011, WISEC 11: PROCEEDINGS OF THE FOURTH ACM CONFERENCE ON WIRELESS NETWORK SECURITY, P145
[8]
Avoine G, 2009, LECT NOTES COMPUT SC, V5735, P250, DOI 10.1007/978-3-642-04474-8_21
[9]
A Formal Analysis of 5G Authentication
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:1383-1396
[10]
Modeling Human Errors in Security Protocols
[J].
2016 IEEE 29TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2016),
2016,
:325-340