Login / Signup

Security Protocols, Constraint Systems, and Group Theories.

Stéphanie DelauneSteve KremerDaniel Pasaila
Published in: IJCAR (2012)
Keyphrases
  • security protocols
  • software engineering
  • cost effective
  • information systems