Sign in

Towards the attacker's view of protocol narrations (or, how to compile security protocols).

Zhiwei LiWeichao Wang
Published in: AsiaCCS (2012)
Keyphrases