Cited By
View all- Jackson DCremers CCohn-Gordon KSasse RCavallaro LKinder JWang XKatz J(2019)Seems LegitProceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security10.1145/3319535.3339813(2165-2180)Online publication date: 6-Nov-2019
- Blanchet B(2014)Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerifFoundations of Security Analysis and Design VII10.1007/978-3-319-10082-1_3(54-87)Online publication date: 2014
- Masi MPugliese RTiezzi F(2012)Security Analysis of Standards-Driven Communication Protocols for Healthcare ScenariosJournal of Medical Systems10.1007/s10916-012-9843-136:6(3695-3711)Online publication date: 1-Dec-2012
- Show More Cited By