Cited By
View all- Jakubowska GDembiński PPenczek WSzreter M(2019)Simulation of Security Protocols based on Scenarios of AttacksFundamenta Informaticae10.5555/2364580.236459493:1-3(185-203)Online publication date: 4-Jan-2019
- Jakubowska GDembiński PPenczek WSzreter M(2019)Simulation of Security Protocols based on Scenarios of AttacksFundamenta Informaticae10.5555/1576070.157608493:1-3(185-203)Online publication date: 4-Jan-2019
- Chen QZhang SZhong Z(2019)Dealing with inconsistent secure messages by weighting majorityKnowledge-Based Systems10.1016/j.knosys.2010.12.00724:6(731-739)Online publication date: 1-Jan-2019
- Show More Cited By