Cited By
View all- Almuzaini NAhmad I(2019)Formal Analysis of the Signal Protocol Using the Scyther Tool2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)10.1109/CAIS.2019.8769532(1-6)Online publication date: May-2019
- Anantharaman SLin HLynch CNarendran PRusinowitch M(2012)Unification Modulo Homomorphic EncryptionJournal of Automated Reasoning10.1007/s10817-010-9205-y48:2(135-158)Online publication date: 1-Feb-2012
- Baskar ARamanujam RSuresh S(2010)A dexptime-Complete Dolev-Yao Theory with Distributive EncryptionMathematical Foundations of Computer Science 201010.1007/978-3-642-15155-2_11(102-113)Online publication date: 2010
- Show More Cited By