Login / Signup
Modeling Adversaries in a Logic for Security Protocol Analysis
Joseph Y. Halpern
Riccardo Pucella
Published in:
CoRR (2006)
Keyphrases
</>
databases
security protocols
query processing
end to end