Sign in

Validation of security protocol implementations from security objectives.

Yulong FuOusmane Koné
Published in: Comput. Secur. (2013)
Keyphrases