Login / Signup
Timed analysis of security protocols.
Ricardo Corin
Sandro Etalle
Pieter H. Hartel
Angelika Mader
Published in:
J. Comput. Secur. (2007)
Keyphrases
</>
security protocols
data analysis
database systems
software engineering
case study
data distribution
cost effective