Login / Signup
Verifying multicast-based security protocols using the inductive method.
Jean Everson Martina
Lawrence C. Paulson
Published in:
SAC (2013)
Keyphrases
</>
databases
data mining
similarity measure
response time
wireless networks
computer networks