Citation to this article as recorded by
Bo Meng, Leyuan Niu, Yitong Yang, Zimao Li 2014. Mechanized Verification of Security Properties of Transport Layer Security 1.2 Protocol with Crypto Verif in Computational Model Inform. Technol. J., 13: 601-613. CrossRef |
Huang, W. and B. Meng, 2011. Automated proof of resistance of denial of service attacks in remote internet voting protocol with extended applied Pi calculus. Inform. Technol. J., 10: 1468-1483. CrossRef |
Jaberi, A., R. Ayanzadeh and A.S.Z. Mousavi, 2012. Two-layer cellular automata based cryptography. Trends Applied Sci. Res., 7: 68-77. CrossRefDirect Link |
Tao, F., W. Shuang and Y. Zhan-Ting, 2012. UC secure network coding against pollution attacks. Inform. Technol. J., 11: 1175-1183. CrossRefDirect Link |
Xu, X., L. Niu and B. Meng, 2013. Automatic verification of security properties of OAuth 2.0 protocol with cryptoverif in computational model. Inform. Technol. J., 12: 2273-2285. CrossRefDirect Link |
Citation to this article as recorded by
Automated Proof of Resistance of Denial of Service Attacks in Remote Internet Voting Protocol with Extended Applied Pi Calculus Information Technology Journal Vol. 10, Issue 8, 1468, 2011 |
Two-layer Cellular Automata Based Cryptography Trends in Applied Sciences Research Vol. 7, Issue 1, 68, 2012 |
Verification of Resistance of Denial of Service Attacks in Extended Applied Pi Calculus with ProVerif Journal of Computers Vol. 7, Issue 4, , 2012 |
How to cite this article
Bo Meng , 2011. A Survey on Analysis of Selected Cryptographic Primitives and Security Protocols in Symbolic Model and Computational Model. Information Technology Journal, 10: 1068-1091.
DOI: 10.3923/itj.2011.1068.1091
URL: https://scialert.net/abstract/?doi=itj.2011.1068.1091
DOI: 10.3923/itj.2011.1068.1091
URL: https://scialert.net/abstract/?doi=itj.2011.1068.1091