Login / Signup
The faithfulness of abstract protocol analysis: Message authentication.
Joshua D. Guttman
F. Javier Thayer
Lenore D. Zuck
Published in:
J. Comput. Secur. (2004)
Keyphrases
</>
image analysis
neural network
data analysis
email
statistical analysis
expressive power