Articles by Bo Meng (13)

Formal Analysis of Key Properties in the Internet Voting Protocol Using Applied Pi Calculus

Bo Meng

Information Technology Journal 7 ( 8 ): 1133 - 1140 , 2008

A Secure Non-Interactive Deniable Authentication Protocol with Strong Deniability Based on Discrete Logarithm Problem and its Application on Internet Voting Protocol

Bo Meng

Information Technology Journal 8 ( 3 ): 302 - 309 , 2009

Formalizing Deniability

Bo Meng

Information Technology Journal 8 ( 5 ): 625 - 642 , 2009

A Critical Review of Receipt-Freeness and Coercion-Resistance

Bo Meng

Information Technology Journal 8 ( 7 ): 934 - 964 , 2009

Refinement of Mechanized Proof of Security Properties of Remote Internet Voting Protocol in Applied PI Calculus with Proverif

Bo Meng

Information Technology Journal 10 ( 2 ): 293 - 334 , 2011

Computationally Sound Mechanized Proofs for Deniable Authentication Protocols with a Probabilistic Polynomial Calculus in Computational Model

Bo Meng and Fei Shao

Information Technology Journal 10 ( 3 ): 611 - 625 , 2011

Automatic Verification of Deniable Authentication Protocol in a Probabilistic Polynomial Calculus with Cryptoverif

Bo Meng

Information Technology Journal 10 ( 4 ): 717 - 735 , 2011

A Survey on Analysis of Selected Cryptographic Primitives and Security Protocols in Symbolic Model and Computational Model

Bo Meng

Information Technology Journal 10 ( 6 ): 1068 - 1091 , 2011

Automated Proof of Resistance of Denial of Service Attacks in Remote Internet Voting Protocol with Extended Applied Pi Calculus

Wei Huang and Bo Meng

Information Technology Journal 10 ( 8 ): 1468 - 1483 , 2011

Automatic Formal Framework of Coercion-resistance in Internet Voting Protocols with CryptoVerif in Computational Model

Bo Meng

Information Technology Journal 11 ( 7 ): 741 - 750 , 2012

Automatic Verification of Security Properties of OAuth 2.0 Protocol with Cryptoverif in Computational Model

Xingdong Xu, Leyuan Niu and Bo Meng

Information Technology Journal 12 ( 12 ): 2273 - 2285 , 2013

Mechanized Verification of Security Properties of Transport Layer Security 1.2 Protocol with Crypto Verif in Computational Model

Bo Meng, Leyuan Niu, Yitong Yang and Zimao Li

Information Technology Journal 13 ( 4 ): 601 - 613 , 2014

Automatic Verification of Security Properties of Remote Internet Voting Protocol in Symbolic Model

Bo Meng, Wei Huang and Jun Qin

Information Technology Journal 9 ( 8 ): 1521 - 1556 , 2010