Login / Signup
Non-interference proof techniques for the analysis of cryptographic protocols.
Michele Bugliesi
Sabina Rossi
Published in:
J. Comput. Secur. (2005)
Keyphrases
</>
cryptographic protocols
data analysis
real time