共 51 条
- [2] Abadi M, 2000, NATO ADV SCI I F-COM, V175, P39
- [3] Mobile values, new names, and secure communication [J]. ACM SIGPLAN NOTICES, 2001, 36 (03) : 104 - 115
- [4] Abadi Martin., 2000, Proceedings of the IFIP International Conference on Theoretical Computer Science, P3, DOI [10.1007/3-540-44929-9_1, DOI 10.1007/3-540-44929-9_1]
- [5] Adida B., 2008, USENIX, P335
- [6] [Anonymous], 2014, Lecture Notes in Computer Science
- [7] Antonopoulos T, 2017, ACM SIGPLAN NOTICES, V52, P362, DOI [10.1145/3140587.3062378, 10.1145/3062341.3062378]
- [8] Arapinis M., 2009, P ICITST, P1
- [9] When Are Three Voters Enough for Privacy Properties? [J]. COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 : 241 - 260
- [10] Analysing Unlinkability and Anonymity Using the Applied Pi Calculus [J]. 2010 23RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2010, : 107 - 121