Login / Signup

Modeling replay and integrity violations attacks for cryptographic protocols source codes verification of e-voting system based on blind intermediaries.

Liudmila BabenkoIlya Pisarev
Published in: SIN (2020)
Keyphrases