"Extending the Strand Space Method with Timestamps: Part I the Theory"
written by Yongjian Li, Jun Pang,
published by Journal of Information Security, Vol.1 No.2, 2010
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Formal Verification of Secrecy in Group Key Protocols Using Event-B
Int'l J. of Communications, Network and System Sciences, 2012
[2] Secure time information in the internet key exchange protocol
Annales UMCS, Informatica, 2011
[3] UMCS