Cited By
View all- Garcia RModesti P(2024)Automatic generation of security protocols attacks specifications and implementationsCyber Security and Applications10.1016/j.csa.2024.1000382(100038)Online publication date: 2024
- Piątkowski JSzymoniak S(2023)Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree FrameworkApplied Sciences10.3390/app13231266813:23(12668)Online publication date: 25-Nov-2023
- Arcile JAndré É(2022)Timed Automata as a Formalism for Expressing Security: A Survey on Theory and PracticeACM Computing Surveys10.1145/353496755:6(1-36)Online publication date: 7-Dec-2022
- Show More Cited By