Cited By
View all- Fröschle S(2015)Leakiness is Decidable for Well-Founded ProtocolsProceedings of the 4th International Conference on Principles of Security and Trust - Volume 903610.1007/978-3-662-46666-7_10(176-195)Online publication date: 11-Apr-2015
- Wang YFan J(2013)Knowing that, knowing what, and public communicationProceedings of the Twenty-Third international joint conference on Artificial Intelligence10.5555/2540128.2540293(1147-1154)Online publication date: 3-Aug-2013
- Chevalier CDelaune SKremer SRyan M(2013)Composition of password-based protocolsFormal Methods in System Design10.1007/s10703-013-0184-643:3(369-413)Online publication date: 1-Dec-2013
- Show More Cited By