Login / Signup
Security Protocols, Constraint Systems, and Group Theories.
Stéphanie Delaune
Steve Kremer
Daniel Pasaila
Published in:
IJCAR (2012)
Keyphrases
</>
security protocols
software engineering
cost effective
information systems