Cited By
View all- Mieno TOkazaki HArai KFuta Y(2024)How to Formalize Loop Iterations in Cryptographic Protocols Using ProVerifIEEE Access10.1109/ACCESS.2024.336845312(31605-31625)Online publication date: 2024
- Liu JWang JYan TQi FChen G(2023)Unknown Traffic Recognition Based on Multi-Feature Fusion and Incremental LearningApplied Sciences10.3390/app1313764913:13(7649)Online publication date: 28-Jun-2023
- Linvill KKaki GWustrow E(2023)Verifying Indistinguishability of Privacy-Preserving ProtocolsProceedings of the ACM on Programming Languages10.1145/36228497:OOPSLA2(1442-1469)Online publication date: 16-Oct-2023
- Show More Cited By