Login / Signup

Prudent engineering practice for cryptographic protocols.

Martín AbadiRoger M. Needham
Published in: IEEE Symposium on Security and Privacy (1994)
Keyphrases
  • cryptographic protocols
  • standard model
  • security properties
  • engineering design
  • low cost
  • security protocols
  • query processing
  • data sources
  • sensor networks
  • software engineering
  • private information retrieval