Cited By
View all- Cortier VKremer SWarinschi B(2011)A Survey of Symbolic Methods in Computational Analysis of Cryptographic SystemsJournal of Automated Reasoning10.1007/s10817-010-9187-946:3-4(225-259)Online publication date: 1-Apr-2011
- Galindo DGarcia FVan Rossum P(2008)Computational soundness of non-malleable commitmentsProceedings of the 4th international conference on Information security practice and experience10.5555/1788494.1788520(361-376)Online publication date: 21-Apr-2008
- Bouganim LNgoc FPucheral P(2008)Dynamic access-control policies on XML encrypted dataACM Transactions on Information and System Security10.1145/1284680.128468410:4(1-37)Online publication date: 22-Jan-2008
- Show More Cited By