메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Untraceability in the applied pi-calculus

Author keywords

[No Author keywords available]

Indexed keywords

CALCULATIONS;

EID: 77950308134     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/icitst.2009.5402514     Document Type: Conference Paper
Times cited : (8)

References (20)
  • 2
    • 0035035153 scopus 로고    scopus 로고
    • Mobile values, new names, and secure communication
    • M. Abadi and C. Fournet. Mobile values, new names, and secure communication. SIGPLAN Not., 36(3):104-115, 2001.
    • (2001) SIGPLAN Not. , vol.36 , Issue.3 , pp. 104-115
    • Abadi, M.1    Fournet, C.2
  • 5
    • 77950316222 scopus 로고    scopus 로고
    • Boycott benetton. http://www.boycottbenetton.com/.
  • 7
    • 3543058869 scopus 로고    scopus 로고
    • Automatic Proof of Strong Secrecy for Security Protocols. in
    • Oakland, California, May
    • B. Blanchet. Automatic Proof of Strong Secrecy for Security Protocols. In IEEE Symposium on Security and Privacy, pages 86-100, Oakland, California, May 2004.
    • (2004) IEEE Symposium on Security and Privacy , pp. 86-100
    • Blanchet, B.1
  • 10
    • 33646028830 scopus 로고    scopus 로고
    • A practical voter-verifiable election scheme
    • D. Chaum, P. Y. A. Ryan, and S. A. Schneider. A practical voter-verifiable election scheme. In ESORICS, pages 118-139, 2005.
    • (2005) ESORICS , pp. 118-139
    • Chaum, D.1    Ryan, P.Y.A.2    Schneider, S.A.3
  • 14
    • 20844459862 scopus 로고    scopus 로고
    • RFID privacy: An overview of problems and proposed solutions
    • S. L. Garfinkel, A. Juels, and R. Pappu. RFID privacy: An overview of problems and proposed solutions. IEEE Security and Privacy, 3(3):34-43, 2005.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.3 , pp. 34-43
    • Garfinkel, S.L.1    Juels, A.2    Pappu, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.