Login / Signup
Admissible Interference by Typing for Cryptographic Protocols.
Alaaeddine Fellah
John Mullins
Published in:
ICICS (2005)
Keyphrases
</>
cryptographic protocols
standard model
security properties
multipath
state space
authentication protocol
security protocols
encryption decryption
private information retrieval
query processing
low cost
access control