Cited By
View all- Hassan AIshaq IMinilla J(2021)Automated verification tools for cryptographic protocols2021 International Conference on Promising Electronic Technologies (ICPET)10.1109/ICPET53277.2021.00017(58-65)Online publication date: Nov-2021
- Permpoontanalarp YChangkhanak A(2011)Security analysis of the TMN protocol by using Coloured Petri Nets: On-the-fly trace generation method and homomorphic property2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)10.1109/JCSSE.2011.5930095(63-68)Online publication date: May-2011
- Jaeger T(2008)Operating System SecuritySynthesis Lectures on Information Security, Privacy, and Trust10.2200/S00126ED1V01Y200808SPT0011:1(1-218)Online publication date: Jan-2008
- Show More Cited By